[WARNING]: Collection infra.leapp does not support Ansible version 2.14.18 [WARNING]: running playbook inside collection infra.leapp ansible-playbook [core 2.14.18] config file = /etc/ansible/ansible.cfg configured module search path = ['/root/.ansible/plugins/modules', '/usr/share/ansible/plugins/modules'] ansible python module location = /usr/lib/python3.9/site-packages/ansible ansible collection location = /root/.ansible/collections:/usr/share/ansible/collections executable location = /usr/bin/ansible-playbook python version = 3.9.25 (main, Nov 10 2025, 00:00:00) [GCC 11.5.0 20240719 (Red Hat 11.5.0-11)] (/usr/bin/python3) jinja version = 3.1.2 libyaml = True Using /etc/ansible/ansible.cfg as config file Skipping callback 'default', as we already have a stdout callback. Skipping callback 'minimal', as we already have a stdout callback. Skipping callback 'oneline', as we already have a stdout callback. PLAYBOOK: tests_remediations_8to9.yml ****************************************** 1 plays in /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_remediations_8to9.yml PLAY [Test RHEL 8 to 9 remediations] ******************************************* TASK [Gathering Facts] ********************************************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_remediations_8to9.yml:2 ok: [managed-node02] TASK [Include tests_upgrade_custom playbook] *********************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_remediations_8to9.yml:22 included: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/tests_upgrade_custom.yml for managed-node02 TASK [tests_upgrade_custom | Check if leapp upgrade log exists] **************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/tests_upgrade_custom.yml:12 ok: [managed-node02] => {"changed": false, "stat": {"exists": false}} TASK [tests_upgrade_custom | Skip test if already upgraded or not RHEL {{ rhel_base_ver }}] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/tests_upgrade_custom.yml:17 META: end_play conditional evaluated to False, continuing play skipping: [managed-node02] => {"msg": "end_play", "skip_reason": "end_play conditional evaluated to False, continuing play"} TASK [tests_upgrade_custom | Include common upgrade tasks] ********************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/tests_upgrade_custom.yml:27 included: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml for managed-node02 TASK [common_upgrade_tasks | Gather setup tasks] ******************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:4 ok: [managed-node02 -> localhost] => {"changed": false, "examined": 1, "files": [{"atime": 1766009443.9910507, "ctime": 1766009443.8420503, "dev": 51716, "gid": 0, "gr_name": "root", "inode": 75497612, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1766009443.8420503, "nlink": 1, "path": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_cifs.yml", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 267, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}], "matched": 1, "msg": "All paths examined", "skipped_paths": {}} TASK [common_upgrade_tasks | Do setup tasks] *********************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:11 included: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_cifs.yml for managed-node02 => (item=/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_cifs.yml) TASK [setup | remediate_cifs | Add a CIFS share to /etc/fstab] ***************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/setup/remediate_cifs.yml:3 changed: [managed-node02] => {"backup": "", "changed": true, "msg": "line added"} TASK [common_upgrade_tasks | Run first analysis] ******************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:21 [WARNING]: Collection community.general does not support Ansible version 2.14.18 TASK [infra.leapp.common : Log directory exists] ******************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:3 changed: [managed-node02] => {"changed": true, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/var/log/ripu", "secontext": "unconfined_u:object_r:var_log_t:s0", "size": 6, "state": "directory", "uid": 0} TASK [infra.leapp.common : Check for existing log file] ************************ task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:11 ok: [managed-node02] => {"changed": false, "stat": {"exists": false}} TASK [infra.leapp.common : Fail if log file already exists] ******************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:16 skipping: [managed-node02] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : Create new log file] ******************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:23 NOTIFIED HANDLER infra.leapp.common : Check for log file for managed-node02 NOTIFIED HANDLER infra.leapp.common : Add end time to log file for managed-node02 NOTIFIED HANDLER infra.leapp.common : Slurp ripu.log file for managed-node02 NOTIFIED HANDLER infra.leapp.common : Decode ripu.log file for managed-node02 NOTIFIED HANDLER infra.leapp.common : Rename log file for managed-node02 changed: [managed-node02] => {"changed": true, "checksum": "7f3fcfecd3a94a277e887360ac36c1ee93514082", "dest": "/var/log/ripu/ripu.log", "gid": 0, "group": "root", "md5sum": "dad42097af1167d770293f30f481f78a", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:var_log_t:s0", "size": 61, "src": "/root/.ansible/tmp/ansible-tmp-1766009834.4027035-8005-145707831020242/source", "state": "file", "uid": 0} TASK [infra.leapp.common : /etc/ansible/facts.d directory exists] ************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:35 changed: [managed-node02] => {"changed": true, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/etc/ansible/facts.d", "secontext": "unconfined_u:object_r:etc_t:s0", "size": 6, "state": "directory", "uid": 0} TASK [infra.leapp.common : Capture current ansible_facts for validation after upgrade] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:43 changed: [managed-node02] => {"changed": true, "checksum": "0028658329eb6624de0afbedbe436077a544766c", "dest": "/etc/ansible/facts.d/pre_ripu.fact", "gid": 0, "group": "root", "md5sum": "86a5500468d0e9ce1998183495a06fdf", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:etc_t:s0", "size": 13835, "src": "/root/.ansible/tmp/ansible-tmp-1766009835.5954185-8155-73261622141338/source", "state": "file", "uid": 0} TASK [infra.leapp.common : Capture a list of non-rhel versioned packages] ****** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:51 ok: [managed-node02] => {"changed": false, "cmd": "set -o pipefail; export PATH=$PATH; rpm -qa | grep -ve '[\\.|+]el8' | grep -vE '^(gpg-pubkey|libmodulemd|katello-ca-consumer)' | sort", "delta": "0:00:00.845200", "end": "2025-12-17 17:17:17.711503", "failed_when_result": false, "msg": "non-zero return code", "rc": 1, "start": "2025-12-17 17:17:16.866303", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} TASK [infra.leapp.common : Create fact with the non-rhel versioned packages list] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:65 ok: [managed-node02] => {"ansible_facts": {"non_rhel_packages": []}, "changed": false} TASK [infra.leapp.common : Capture the list of non-rhel versioned packages in a separate fact file] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:69 changed: [managed-node02] => {"changed": true, "checksum": "97d170e1550eee4afc0af065b78cda302a97674c", "dest": "/etc/ansible/facts.d/non_rhel_packages.fact", "gid": 0, "group": "root", "md5sum": "d751713988987e9331980363e24189ce", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:etc_t:s0", "size": 2, "src": "/root/.ansible/tmp/ansible-tmp-1766009837.8809972-8364-24936593168960/source", "state": "file", "uid": 0} TASK [infra.leapp.analysis : Include tasks for preupg assistant analysis] ****** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/main.yml:9 skipping: [managed-node02] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.analysis : Include tasks for leapp preupgrade analysis] ****** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/main.yml:13 included: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml for managed-node02 TASK [infra.leapp.analysis : analysis-leapp | Register to leapp activation key] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:2 skipping: [managed-node02] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [analysis-leapp | Include custom_local_repos for local_repos_pre_leapp] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:14 TASK [infra.leapp.common : custom_local_repos | Remove old /etc/leapp/files/leapp_upgrade_repositories.repo] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:2 skipping: [managed-node02] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : custom_local_repos | Enable custom upgrade yum repositories] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:9 skipping: [managed-node02] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} TASK [infra.leapp.analysis : analysis-leapp | Install packages for preupgrade analysis on RHEL 7] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:22 skipping: [managed-node02] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.analysis : analysis-leapp | Install packages for preupgrade analysis on RHEL 8] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:29 changed: [managed-node02] => {"changed": true, "msg": "", "rc": 0, "results": ["Installed: policycoreutils-python-utils-2.9-26.el8_10.noarch", "Installed: leapp-0.20.0-2.el8_10.noarch", "Installed: leapp-deps-0.20.0-2.el8_10.noarch", "Installed: leapp-upgrade-el8toel9-0.23.0-2.el8_10.noarch", "Installed: leapp-upgrade-el8toel9-deps-0.23.0-2.el8_10.noarch", "Installed: systemd-container-239-82.el8_10.13.x86_64", "Installed: python3-leapp-0.20.0-2.el8_10.noarch"]} TASK [infra.leapp.analysis : analysis-leapp | Install packages for preupgrade analysis on RHEL 9] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:36 skipping: [managed-node02] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.analysis : analysis-leapp | Ensure leapp log directory exists] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:43 ok: [managed-node02] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "root", "path": "/var/log/leapp", "secontext": "system_u:object_r:var_log_t:s0", "size": 6, "state": "directory", "uid": 0} TASK [infra.leapp.analysis : analysis-leapp | Populate leapp_answers file] ***** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:51 changed: [managed-node02] => {"changed": true, "checksum": "3d934ad808576e3a7fb4c14a89645a4ad55ccf53", "dest": "/var/log/leapp/answerfile", "gid": 0, "group": "root", "md5sum": "01e375235c8e4cafdec593b260354063", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:var_log_t:s0", "size": 48, "src": "/root/.ansible/tmp/ansible-tmp-1766009851.328443-8868-127373187370051/source", "state": "file", "uid": 0} TASK [analysis-leapp | Create /etc/leapp/files/leapp_upgrade_repositories.repo] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:60 TASK [infra.leapp.common : custom_local_repos | Remove old /etc/leapp/files/leapp_upgrade_repositories.repo] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:2 ok: [managed-node02] => {"changed": false, "path": "/etc/leapp/files/leapp_upgrade_repositories.repo", "state": "absent"} TASK [infra.leapp.common : custom_local_repos | Enable custom upgrade yum repositories] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:9 changed: [managed-node02] => (item=None) => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": true} changed: [managed-node02] => (item=None) => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": true} changed: [managed-node02] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": true} TASK [infra.leapp.analysis : analysis-leapp | Leapp preupgrade report] ********* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:71 ASYNC FAILED on managed-node02: jid=j468921254348.7245 changed: [managed-node02] => {"ansible_job_id": "j468921254348.7245", "changed": true, "cmd": "set -o pipefail; export PATH=$PATH; ulimit -n 16384; leapp preupgrade --report-schema=1.2.0 --no-rhsm 2>&1 | tee -a /var/log/ripu/ripu.log\n", "delta": "0:00:41.183535", "end": "2025-12-17 17:18:14.928797", "failed_when_result": false, "finished": 1, "msg": "non-zero return code", "rc": 1, "results_file": "/root/.ansible_async/j468921254348.7245", "start": "2025-12-17 17:17:33.745262", "started": 1, "stderr": "", "stderr_lines": [], "stdout": "\n============================================================\n UNSUPPORTED UPGRADE \n============================================================\n\nVariable LEAPP_UNSUPPORTED has been detected. Proceeding at your own risk.\nDevelopment variables have been detected:\n- LEAPP_DEVEL_RPMS_ALL_SIGNED=1\n\n============================================================\n UNSUPPORTED UPGRADE \n============================================================\n\n==> Processing phase `configuration_phase`\n====> * ipu_workflow_config\n IPU workflow config actor\n==> Processing phase `FactsCollection`\n====> * repository_mapping\n Produces message containing repository mapping based on provided file.\n====> * scan_target_os_image\n Scans the provided target OS ISO image to use as a content source for the IPU, if any.\n====> * root_scanner\n Scan the system root directory and produce a message containing\n====> * scanmemory\n Scan Memory of the machine.\n====> * nis_scanner\n Collect information about the NIS packages configuration.\n====> * persistentnetnames\n Get network interface information for physical ethernet interfaces of the original system.\n====> * scan_grub_device_name\n Find the name of the block devices where GRUB is located\n====> * scan_systemd_source\n Provides info about systemd on the source system\n====> * get_enabled_modules\n Provides data about which module streams are enabled on the source system.\n====> * roce_scanner\n Detect active RoCE NICs on IBM Z machines.\n====> * network_manager_connection_scanner\n Scan NetworkManager connection keyfiles\n====> * scanzfcp\n In case of s390x architecture, check whether ZFCP is used.\n====> * storage_scanner\n Provides data about storage settings.\n====> * scanclienablerepo\n Produce CustomTargetRepository based on the LEAPP_ENABLE_REPOS in config.\n====> * firewalld_collect_global_config\n This actor reads firewalld's configuration and produces Model\n====> * open_ssl_config_scanner\n Read an OpenSSL configuration file for further analysis.\n====> * scan_sap_hana\n Gathers information related to SAP HANA instances on the system.\n====> * network_manager_read_config\n Provides data about NetworkManager configuration.\n====> * xorgdrvfacts8to9\n Check the journal logs for deprecated Xorg drivers.\n====> * check_custom_network_scripts\n Check the existence of custom network-scripts and warn user about possible\n====> * scan_files_for_target_userspace\n Scan the source system and identify files that will be copied into the target userspace when it is created.\n====> * scan_kernel_cmdline\n Scan the kernel command line of the booted system.\n====> * udevadm_info\n Produces data exported by the \"udevadm info\" command.\n====> * biosdevname\n Enable biosdevname on the target RHEL system if all interfaces on the source RHEL\n====> * copy_dnf_conf_into_target_userspace\n Copy dnf.conf into target userspace\n====> * rpm_scanner\n Provides data about installed RPM Packages.\n====> * scan_custom_modifications_actor\n Collects information about files in leapp directories that have been modified or newly added.\n====> * sssd_facts_8to9\n Check SSSD configuration for changes in RHEL9 and report them in model.\n====> * read_openssh_config\n Collect information about the OpenSSH configuration.\n====> * firewalld_collect_used_object_names\n This actor reads firewalld's configuration and produces Model\n====> * scan_subscription_manager_info\n Scans the current system for subscription manager information\n====> * scan_grub_config\n Scan grub configuration files for errors.\n====> * scandasd\n In case of s390x architecture, check whether DASD is used.\n====> * distribution_signed_rpm_scanner\n Provide data about distribution signed & third-party RPM packages.\n====> * scan_fips\n Determine whether the source system has FIPS enabled.\n====> * scan_source_files\n Scan files (explicitly specified) of the source system.\n====> * register_ruby_irb_adjustment\n Register a workaround to allow rubygem-irb's directory -> symlink conversion.\n====> * remove_obsolete_gpg_keys\n Remove obsoleted RPM GPG keys.\n====> * rpm_transaction_config_tasks_collector\n Provides additional RPM transaction tasks from /etc/leapp/transaction.\n====> * scan_third_party_target_python_modules\n Detect third-party target Python modules and RPMs on the source system.\n====> * trusted_gpg_keys_scanner\n Scan for trusted GPG keys.\n====> * scan_pkg_manager\n Provides data about package manager (yum/dnf)\n====> * scan_dnf_pluginpath\n Scans DNF configuration for custom pluginpath option.\n====> * persistentnetnamesdisable\n Disable systemd-udevd persistent network naming on machine with single eth0 NIC\n====> * scancryptopolicies\n Scan information about system wide set crypto policies including:\n====> * ifcfg_scanner\n Scan ifcfg files with legacy network configuration\n====> * scan_custom_repofile\n Scan the custom /etc/leapp/files/leapp_upgrade_repositories.repo repo file.\n====> * transaction_workarounds\n Provides additional RPM transaction tasks based on bundled RPM packages.\n====> * luks_scanner\n Provides data about active LUKS devices.\n====> * load_device_driver_deprecation_data\n Loads deprecation data for drivers and devices (PCI & CPU)\n====> * scanblacklistca\n Scan the file system for distrusted CA's in the blacklist directory.\n====> * system_facts\n Provides data about many facts from system.\n====> * pci_devices_scanner\n Provides data about existing PCI Devices.\n====> * scan_source_boot_entry\n Scan the default boot entry of the source system.\n====> * xfs_info_scanner\n This actor scans all mounted mountpoints for XFS information.\n====> * scancpu\n Scan CPUs of the machine.\n====> * used_repository_scanner\n Scan used enabled repositories\n====> * scan_hybrid_image_azure\n Check if the system is using Azure hybrid image.\n====> * get_installed_desktops\n Actor checks if kde or gnome desktop environments\n====> * enable_lvm_autoactivation\n Enable LVM autoactivation in upgrade initramfs.\n====> * scan_source_kernel\n Scan the source system kernel.\n====> * checkrhui\n Check if system is using RHUI infrastructure (on public cloud) and send messages to\n====> * vdo_conversion_scanner\n Provides conversion info about VDO devices.\n====> * multipath_conf_read_8to9\n Read multipath configuration files and extract the necessary information\n====> * satellite_upgrade_facts\n Report which Satellite packages require updates and how to handle PostgreSQL data\n====> * satellite_upgrade_services\n Reconfigure Satellite services\n====> * scan_dynamic_linker_configuration\n Scan the dynamic linker configuration and find modifications.\n====> * ipa_scanner\n Scan system for ipa-client and ipa-server status\n====> * selinuxcontentscanner\n Scan the system for any SELinux customizations\n====> * repositories_blacklist\n Exclude target repositories provided by Red Hat without support.\n====> * detect_kernel_drivers\n Matches all currently loaded kernel drivers against known deprecated and removed drivers.\n====> * scan_default_initramfs\n Scan details of the default boot entry's initramfs image.\n====> * pes_events_scanner\n Provides data about package events from Package Evolution Service.\n====> * setuptargetrepos\n Produces list of repositories that should be available to be used during IPU process.\n==> Processing phase `Checks`\n====> * check_vdo\n Check if VDO devices need to be migrated to lvm management.\n====> * check_bls_grub_onppc64\n Check whether GRUB config is BLS aware on RHEL 8 ppc64le systems\n====> * cephvolumescan\n Retrieves the list of encrypted Ceph OSD\n====> * check_ifcfg\n Ensures that ifcfg files are compatible with NetworkManager\n====> * check_skipped_repositories\n Produces a report if any repositories enabled on the system are going to be skipped.\n====> * nis_check\n Checks if any of NIS components is installed and configured\n====> * xorgdrvcheck8to9\n Warn if Xorg deprecated drivers are in use.\n====> * sssd_check_8to9\n Check SSSD configuration for changes in RHEL9 and report them in model.\n====> * check_cifs\n Check if CIFS filesystem is in use. If yes, inhibit the upgrade process.\n====> * mysql_check\n Actor checking for presence of MySQL installation.\n====> * open_ssl_config_check\n The OpenSSL configuration changed between RHEL8 and RHEL9 significantly with the rebase to\n====> * mariadb_check\n Actor checking for presence of MariaDB installation.\n====> * check_target_iso\n Check that the provided target ISO is a valid ISO image and is located on a persistent partition.\n====> * efi_check_boot\n Adjust EFI boot entry for first reboot\n====> * emit_net_naming_scheme\n Emit necessary modifications of the upgrade environment and target command line to use net.naming-scheme.\n====> * check_third_party_target_python_modules\n Produces a report if any third-party target Python modules are detected on the source system.\n====> * bacula_check\n Actor checking for presence of Bacula installation.\n====> * postgresql_check\n Actor checking for presence of PostgreSQL installation.\n====> * check_systemd_broken_symlinks\n Check whether some systemd symlinks are broken\n====> * check_grubenv_to_file\n Check whether grubenv is a symlink on Azure hybrid images using BIOS.\n====> * network_deprecations\n Ensures that network configuration doesn't rely on unsupported settings\n====> * check_nfs\n Check if NFS filesystem is in use. If yes, inhibit the upgrade process.\n====> * check_persistent_mounts\n Check if mounts required to be persistent are mounted in persistent fashion.\n====> * distribution_signed_rpm_check\n Check if there are any packages that are not signed by distribution GPG keys.\n====> * check_custom_modifications_actor\n Checks CustomModifications messages and produces a report about files in leapp directories that have been\n====> * check_kpatch\n Carry over kpatch-dnf and it's config into the container\n====> * check_root_symlinks\n Check if the symlinks /bin and /lib are relative, not absolute.\n====> * check_openssl_conf\n Check whether the openssl configuration and openssl-IBMCA.\n====> * firewalld_check_service_tftp_client\n This actor will inhibit if firewalld's configuration is using service\n====> * check_luks\n Check if any encrypted partitions are in use and whether they are supported for the upgrade.\n====> * check_nvidia_proprietary_driver\n Check if NVIDIA proprietary driver is in use. If yes, inhibit the upgrade process.\n====> * multipath_conf_check_8to9\n Checks if changes to the multipath configuration files are necessary\n====> * check_consumed_assets\n Check whether Leapp is using correct data assets.\n====> * crypto_policies_check\n This actor consumes previously gathered information about crypto policies on the source\n====> * check_microarchitecture\n Inhibit if RHEL9 microarchitecture requirements are not satisfied\n====> * check_yum_plugins_enabled\n Checks that the required yum plugins are enabled.\n====> * check_installed_kernels\n Inhibit IPU (in-place upgrade) when installed kernels conflict with a safe upgrade.\n====> * open_ssh_drop_in_directory_check\n Trigger a notice that the main sshd_config will be updated to contain\n====> * check_fips\n Inhibit upgrade if FIPS is detected as enabled.\n====> * roce_check\n Check whether RoCE is used on the system and well configured for the upgrade.\n====> * check_sap_hana\n If SAP HANA has been detected, several checks are performed to ensure a successful upgrade.\n====> * firewalld_check_allow_zone_drifting\n This actor will check if AllowZoneDrifting=yes in firewalld.conf. This\n====> * check_target_version\n Check that the target system version is supported by the upgrade process.\n====> * check_insights_auto_register\n Checks if system can be automatically registered into Red Hat Lightspeed\n====> * detect_grub_config_error\n Check grub configuration for various errors.\n====> * check_grub_core\n Check whether we are on legacy (BIOS) system and instruct Leapp to upgrade GRUB core\n====> * check_valid_grubcfg_hybrid\n Check potential for boot failures in Azure Gen1 VMs due to invalid grubcfg\n====> * check_rhsmsku\n Ensure the system is subscribed to the subscription manager\n====> * open_ssh_subsystem_sftp\n The RHEL9 changes the SCP to use SFTP protocol internally. The both RHEL8 and RHEL9\n====> * checkmemory\n The actor check the size of RAM against RHEL8 minimal hardware requirements\n====> * check_etc_releasever\n Check releasever info and provide a guidance based on the facts\n====> * check_fstab_mount_order\n Checks order of entries in /etc/fstab based on their mount point and inhibits upgrade if overshadowing is detected.\n====> * check_dynamic_linker_configuration\n Check for customization of dynamic linker configuration.\n====> * openssh_permit_root_login\n OpenSSH no longer allows root logins with password.\n====> * checktargetrepos\n Check whether target dnf repositories are specified on RHEL.\n====> * check_mount_options\n Check for mount options preventing the upgrade.\n====> * check_boot_avail_space\n Check if at least 100Mib of available space on /boot. If not, inhibit the upgrade process.\n====> * dotnet_unsupported_versions_check\n Check for installed .NET versions that are no longer supported.\n====> * check_detected_devices_and_drivers\n Checks whether or not detected devices and drivers are usable on the target system.\n====> * checkblacklistca\n No documentation has been provided for the checkblacklistca actor.\n====> * check_se_linux\n Check SELinux status and produce decision messages for further action.\n====> * unsupported_upgrade_check\n Checks environment variables and produces a warning report if the upgrade is unsupported.\n====> * check_arm_bootloader\n Install required RPM packages for ARM system upgrades on paths with\n====> * check_dnf_pluginpath\n Inhibits the upgrade if a custom DNF plugin path is configured.\n====> * check_deprecated_rpm_signature\n Check whether any packages signed by RSA/SHA1 are installed\n====> * check_ipa_server\n Check for ipa-server and inhibit upgrade\n====> * check_os_release\n Check if the current RHEL minor version is supported. If not, inhibit the upgrade process.\n====> * check_system_arch\n Check if system is running at a supported architecture. If no, inhibit the upgrade process.\n====> * check_rpm_transaction_events\n Filter RPM transaction events based on installed RPM packages\n====> * check_skip_phase\n Skip all the subsequent phases until the report phase.\n==> Processing phase `Reports`\n====> * verify_check_results\n Check all dialogs and notify that user needs to make some choices.\n====> * verify_check_results\n Check all generated results messages and notify user about them.\n\nDebug output written to /var/log/leapp/leapp-preupgrade.log\n\n============================================================\n REPORT OVERVIEW \n============================================================\n\nUpgrade has been inhibited due to the following problems:\n 1. Use of CIFS detected. Upgrade can't proceed\n 2. Use of NFS detected. Upgrade can't proceed\n\nHIGH and MEDIUM severity reports:\n 1. Packages available in excluded repositories will not be installed\n 2. GRUB2 core will be automatically updated during the upgrade\n 3. Remote root logins globally allowed using password\n 4. Upgrade is unsupported\n\nReports summary:\n Errors: 0\n Inhibitors: 2\n HIGH severity reports: 4\n MEDIUM severity reports: 0\n LOW severity reports: 1\n INFO severity reports: 3\n\nBefore continuing, review the full report below for details about discovered problems and possible remediation instructions:\n A report has been generated at /var/log/leapp/leapp-report.txt\n A report has been generated at /var/log/leapp/leapp-report.json\n\n============================================================\n END OF REPORT OVERVIEW \n============================================================\n\nAnswerfile has been generated at /var/log/leapp/answerfile", "stdout_lines": ["", "============================================================", " UNSUPPORTED UPGRADE ", "============================================================", "", "Variable LEAPP_UNSUPPORTED has been detected. Proceeding at your own risk.", "Development variables have been detected:", "- LEAPP_DEVEL_RPMS_ALL_SIGNED=1", "", "============================================================", " UNSUPPORTED UPGRADE ", "============================================================", "", "==> Processing phase `configuration_phase`", "====> * ipu_workflow_config", " IPU workflow config actor", "==> Processing phase `FactsCollection`", "====> * repository_mapping", " Produces message containing repository mapping based on provided file.", "====> * scan_target_os_image", " Scans the provided target OS ISO image to use as a content source for the IPU, if any.", "====> * root_scanner", " Scan the system root directory and produce a message containing", "====> * scanmemory", " Scan Memory of the machine.", "====> * nis_scanner", " Collect information about the NIS packages configuration.", "====> * persistentnetnames", " Get network interface information for physical ethernet interfaces of the original system.", "====> * scan_grub_device_name", " Find the name of the block devices where GRUB is located", "====> * scan_systemd_source", " Provides info about systemd on the source system", "====> * get_enabled_modules", " Provides data about which module streams are enabled on the source system.", "====> * roce_scanner", " Detect active RoCE NICs on IBM Z machines.", "====> * network_manager_connection_scanner", " Scan NetworkManager connection keyfiles", "====> * scanzfcp", " In case of s390x architecture, check whether ZFCP is used.", "====> * storage_scanner", " Provides data about storage settings.", "====> * scanclienablerepo", " Produce CustomTargetRepository based on the LEAPP_ENABLE_REPOS in config.", "====> * firewalld_collect_global_config", " This actor reads firewalld's configuration and produces Model", "====> * open_ssl_config_scanner", " Read an OpenSSL configuration file for further analysis.", "====> * scan_sap_hana", " Gathers information related to SAP HANA instances on the system.", "====> * network_manager_read_config", " Provides data about NetworkManager configuration.", "====> * xorgdrvfacts8to9", " Check the journal logs for deprecated Xorg drivers.", "====> * check_custom_network_scripts", " Check the existence of custom network-scripts and warn user about possible", "====> * scan_files_for_target_userspace", " Scan the source system and identify files that will be copied into the target userspace when it is created.", "====> * scan_kernel_cmdline", " Scan the kernel command line of the booted system.", "====> * udevadm_info", " Produces data exported by the \"udevadm info\" command.", "====> * biosdevname", " Enable biosdevname on the target RHEL system if all interfaces on the source RHEL", "====> * copy_dnf_conf_into_target_userspace", " Copy dnf.conf into target userspace", "====> * rpm_scanner", " Provides data about installed RPM Packages.", "====> * scan_custom_modifications_actor", " Collects information about files in leapp directories that have been modified or newly added.", "====> * sssd_facts_8to9", " Check SSSD configuration for changes in RHEL9 and report them in model.", "====> * read_openssh_config", " Collect information about the OpenSSH configuration.", "====> * firewalld_collect_used_object_names", " This actor reads firewalld's configuration and produces Model", "====> * scan_subscription_manager_info", " Scans the current system for subscription manager information", "====> * scan_grub_config", " Scan grub configuration files for errors.", "====> * scandasd", " In case of s390x architecture, check whether DASD is used.", "====> * distribution_signed_rpm_scanner", " Provide data about distribution signed & third-party RPM packages.", "====> * scan_fips", " Determine whether the source system has FIPS enabled.", "====> * scan_source_files", " Scan files (explicitly specified) of the source system.", "====> * register_ruby_irb_adjustment", " Register a workaround to allow rubygem-irb's directory -> symlink conversion.", "====> * remove_obsolete_gpg_keys", " Remove obsoleted RPM GPG keys.", "====> * rpm_transaction_config_tasks_collector", " Provides additional RPM transaction tasks from /etc/leapp/transaction.", "====> * scan_third_party_target_python_modules", " Detect third-party target Python modules and RPMs on the source system.", "====> * trusted_gpg_keys_scanner", " Scan for trusted GPG keys.", "====> * scan_pkg_manager", " Provides data about package manager (yum/dnf)", "====> * scan_dnf_pluginpath", " Scans DNF configuration for custom pluginpath option.", "====> * persistentnetnamesdisable", " Disable systemd-udevd persistent network naming on machine with single eth0 NIC", "====> * scancryptopolicies", " Scan information about system wide set crypto policies including:", "====> * ifcfg_scanner", " Scan ifcfg files with legacy network configuration", "====> * scan_custom_repofile", " Scan the custom /etc/leapp/files/leapp_upgrade_repositories.repo repo file.", "====> * transaction_workarounds", " Provides additional RPM transaction tasks based on bundled RPM packages.", "====> * luks_scanner", " Provides data about active LUKS devices.", "====> * load_device_driver_deprecation_data", " Loads deprecation data for drivers and devices (PCI & CPU)", "====> * scanblacklistca", " Scan the file system for distrusted CA's in the blacklist directory.", "====> * system_facts", " Provides data about many facts from system.", "====> * pci_devices_scanner", " Provides data about existing PCI Devices.", "====> * scan_source_boot_entry", " Scan the default boot entry of the source system.", "====> * xfs_info_scanner", " This actor scans all mounted mountpoints for XFS information.", "====> * scancpu", " Scan CPUs of the machine.", "====> * used_repository_scanner", " Scan used enabled repositories", "====> * scan_hybrid_image_azure", " Check if the system is using Azure hybrid image.", "====> * get_installed_desktops", " Actor checks if kde or gnome desktop environments", "====> * enable_lvm_autoactivation", " Enable LVM autoactivation in upgrade initramfs.", "====> * scan_source_kernel", " Scan the source system kernel.", "====> * checkrhui", " Check if system is using RHUI infrastructure (on public cloud) and send messages to", "====> * vdo_conversion_scanner", " Provides conversion info about VDO devices.", "====> * multipath_conf_read_8to9", " Read multipath configuration files and extract the necessary information", "====> * satellite_upgrade_facts", " Report which Satellite packages require updates and how to handle PostgreSQL data", "====> * satellite_upgrade_services", " Reconfigure Satellite services", "====> * scan_dynamic_linker_configuration", " Scan the dynamic linker configuration and find modifications.", "====> * ipa_scanner", " Scan system for ipa-client and ipa-server status", "====> * selinuxcontentscanner", " Scan the system for any SELinux customizations", "====> * repositories_blacklist", " Exclude target repositories provided by Red Hat without support.", "====> * detect_kernel_drivers", " Matches all currently loaded kernel drivers against known deprecated and removed drivers.", "====> * scan_default_initramfs", " Scan details of the default boot entry's initramfs image.", "====> * pes_events_scanner", " Provides data about package events from Package Evolution Service.", "====> * setuptargetrepos", " Produces list of repositories that should be available to be used during IPU process.", "==> Processing phase `Checks`", "====> * check_vdo", " Check if VDO devices need to be migrated to lvm management.", "====> * check_bls_grub_onppc64", " Check whether GRUB config is BLS aware on RHEL 8 ppc64le systems", "====> * cephvolumescan", " Retrieves the list of encrypted Ceph OSD", "====> * check_ifcfg", " Ensures that ifcfg files are compatible with NetworkManager", "====> * check_skipped_repositories", " Produces a report if any repositories enabled on the system are going to be skipped.", "====> * nis_check", " Checks if any of NIS components is installed and configured", "====> * xorgdrvcheck8to9", " Warn if Xorg deprecated drivers are in use.", "====> * sssd_check_8to9", " Check SSSD configuration for changes in RHEL9 and report them in model.", "====> * check_cifs", " Check if CIFS filesystem is in use. If yes, inhibit the upgrade process.", "====> * mysql_check", " Actor checking for presence of MySQL installation.", "====> * open_ssl_config_check", " The OpenSSL configuration changed between RHEL8 and RHEL9 significantly with the rebase to", "====> * mariadb_check", " Actor checking for presence of MariaDB installation.", "====> * check_target_iso", " Check that the provided target ISO is a valid ISO image and is located on a persistent partition.", "====> * efi_check_boot", " Adjust EFI boot entry for first reboot", "====> * emit_net_naming_scheme", " Emit necessary modifications of the upgrade environment and target command line to use net.naming-scheme.", "====> * check_third_party_target_python_modules", " Produces a report if any third-party target Python modules are detected on the source system.", "====> * bacula_check", " Actor checking for presence of Bacula installation.", "====> * postgresql_check", " Actor checking for presence of PostgreSQL installation.", "====> * check_systemd_broken_symlinks", " Check whether some systemd symlinks are broken", "====> * check_grubenv_to_file", " Check whether grubenv is a symlink on Azure hybrid images using BIOS.", "====> * network_deprecations", " Ensures that network configuration doesn't rely on unsupported settings", "====> * check_nfs", " Check if NFS filesystem is in use. If yes, inhibit the upgrade process.", "====> * check_persistent_mounts", " Check if mounts required to be persistent are mounted in persistent fashion.", "====> * distribution_signed_rpm_check", " Check if there are any packages that are not signed by distribution GPG keys.", "====> * check_custom_modifications_actor", " Checks CustomModifications messages and produces a report about files in leapp directories that have been", "====> * check_kpatch", " Carry over kpatch-dnf and it's config into the container", "====> * check_root_symlinks", " Check if the symlinks /bin and /lib are relative, not absolute.", "====> * check_openssl_conf", " Check whether the openssl configuration and openssl-IBMCA.", "====> * firewalld_check_service_tftp_client", " This actor will inhibit if firewalld's configuration is using service", "====> * check_luks", " Check if any encrypted partitions are in use and whether they are supported for the upgrade.", "====> * check_nvidia_proprietary_driver", " Check if NVIDIA proprietary driver is in use. If yes, inhibit the upgrade process.", "====> * multipath_conf_check_8to9", " Checks if changes to the multipath configuration files are necessary", "====> * check_consumed_assets", " Check whether Leapp is using correct data assets.", "====> * crypto_policies_check", " This actor consumes previously gathered information about crypto policies on the source", "====> * check_microarchitecture", " Inhibit if RHEL9 microarchitecture requirements are not satisfied", "====> * check_yum_plugins_enabled", " Checks that the required yum plugins are enabled.", "====> * check_installed_kernels", " Inhibit IPU (in-place upgrade) when installed kernels conflict with a safe upgrade.", "====> * open_ssh_drop_in_directory_check", " Trigger a notice that the main sshd_config will be updated to contain", "====> * check_fips", " Inhibit upgrade if FIPS is detected as enabled.", "====> * roce_check", " Check whether RoCE is used on the system and well configured for the upgrade.", "====> * check_sap_hana", " If SAP HANA has been detected, several checks are performed to ensure a successful upgrade.", "====> * firewalld_check_allow_zone_drifting", " This actor will check if AllowZoneDrifting=yes in firewalld.conf. This", "====> * check_target_version", " Check that the target system version is supported by the upgrade process.", "====> * check_insights_auto_register", " Checks if system can be automatically registered into Red Hat Lightspeed", "====> * detect_grub_config_error", " Check grub configuration for various errors.", "====> * check_grub_core", " Check whether we are on legacy (BIOS) system and instruct Leapp to upgrade GRUB core", "====> * check_valid_grubcfg_hybrid", " Check potential for boot failures in Azure Gen1 VMs due to invalid grubcfg", "====> * check_rhsmsku", " Ensure the system is subscribed to the subscription manager", "====> * open_ssh_subsystem_sftp", " The RHEL9 changes the SCP to use SFTP protocol internally. The both RHEL8 and RHEL9", "====> * checkmemory", " The actor check the size of RAM against RHEL8 minimal hardware requirements", "====> * check_etc_releasever", " Check releasever info and provide a guidance based on the facts", "====> * check_fstab_mount_order", " Checks order of entries in /etc/fstab based on their mount point and inhibits upgrade if overshadowing is detected.", "====> * check_dynamic_linker_configuration", " Check for customization of dynamic linker configuration.", "====> * openssh_permit_root_login", " OpenSSH no longer allows root logins with password.", "====> * checktargetrepos", " Check whether target dnf repositories are specified on RHEL.", "====> * check_mount_options", " Check for mount options preventing the upgrade.", "====> * check_boot_avail_space", " Check if at least 100Mib of available space on /boot. If not, inhibit the upgrade process.", "====> * dotnet_unsupported_versions_check", " Check for installed .NET versions that are no longer supported.", "====> * check_detected_devices_and_drivers", " Checks whether or not detected devices and drivers are usable on the target system.", "====> * checkblacklistca", " No documentation has been provided for the checkblacklistca actor.", "====> * check_se_linux", " Check SELinux status and produce decision messages for further action.", "====> * unsupported_upgrade_check", " Checks environment variables and produces a warning report if the upgrade is unsupported.", "====> * check_arm_bootloader", " Install required RPM packages for ARM system upgrades on paths with", "====> * check_dnf_pluginpath", " Inhibits the upgrade if a custom DNF plugin path is configured.", "====> * check_deprecated_rpm_signature", " Check whether any packages signed by RSA/SHA1 are installed", "====> * check_ipa_server", " Check for ipa-server and inhibit upgrade", "====> * check_os_release", " Check if the current RHEL minor version is supported. If not, inhibit the upgrade process.", "====> * check_system_arch", " Check if system is running at a supported architecture. If no, inhibit the upgrade process.", "====> * check_rpm_transaction_events", " Filter RPM transaction events based on installed RPM packages", "====> * check_skip_phase", " Skip all the subsequent phases until the report phase.", "==> Processing phase `Reports`", "====> * verify_check_results", " Check all dialogs and notify that user needs to make some choices.", "====> * verify_check_results", " Check all generated results messages and notify user about them.", "", "Debug output written to /var/log/leapp/leapp-preupgrade.log", "", "============================================================", " REPORT OVERVIEW ", "============================================================", "", "Upgrade has been inhibited due to the following problems:", " 1. Use of CIFS detected. Upgrade can't proceed", " 2. Use of NFS detected. Upgrade can't proceed", "", "HIGH and MEDIUM severity reports:", " 1. Packages available in excluded repositories will not be installed", " 2. GRUB2 core will be automatically updated during the upgrade", " 3. Remote root logins globally allowed using password", " 4. Upgrade is unsupported", "", "Reports summary:", " Errors: 0", " Inhibitors: 2", " HIGH severity reports: 4", " MEDIUM severity reports: 0", " LOW severity reports: 1", " INFO severity reports: 3", "", "Before continuing, review the full report below for details about discovered problems and possible remediation instructions:", " A report has been generated at /var/log/leapp/leapp-report.txt", " A report has been generated at /var/log/leapp/leapp-report.json", "", "============================================================", " END OF REPORT OVERVIEW ", "============================================================", "", "Answerfile has been generated at /var/log/leapp/answerfile"]} TASK [analysis-leapp | Include custom_local_repos for local_repos_post_analysis] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:89 TASK [infra.leapp.common : custom_local_repos | Remove old /etc/leapp/files/leapp_upgrade_repositories.repo] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:2 skipping: [managed-node02] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : custom_local_repos | Enable custom upgrade yum repositories] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:9 skipping: [managed-node02] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} TASK [infra.leapp.analysis : analysis-leapp | Include check-results-file.yml] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:97 included: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/check-results-file.yml for managed-node02 TASK [infra.leapp.analysis : check-results-file | Result file status] ********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/check-results-file.yml:2 ok: [managed-node02] => {"changed": false, "stat": {"atime": 1766009894.6879172, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 16, "charset": "us-ascii", "checksum": "953b3073b49cae4e3917e091744520b805d21cdc", "ctime": 1766009894.6879172, "dev": 51715, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 662700208, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1766009894.6879172, "nlink": 1, "path": "/var/log/leapp/leapp-report.txt", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 6051, "uid": 0, "version": "1098355651", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} TASK [infra.leapp.analysis : check-results-file | Check that result file exists] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/check-results-file.yml:7 ok: [managed-node02] => { "changed": false, "msg": "All assertions passed" } TASK [analysis-leapp | Run parse_leapp_report to check for inhibitors] ********* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:100 TASK [infra.leapp.common : parse_leapp_report | Default upgrade_inhibited to false] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:12 ok: [managed-node02] => {"ansible_facts": {"upgrade_inhibited": false}, "changed": false} TASK [infra.leapp.common : parse_leapp_report | Collect human readable report results] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:16 ok: [managed-node02] => {"changed": false, "content": "Risk Factor: high (inhibitor)
Title: Use of CIFS detected. Upgrade can't proceed
Summary: CIFS is currently not supported by the inplace upgrade.
Related links:
    - Leapp upgrade failed with error "Inhibitor: Use of CIFS detected. Upgrade cannot proceed": https://access.redhat.com/solutions/6964304
Remediation: [hint] Comment out CIFS entries to proceed with the upgrade.
Key: d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a
----------------------------------------
Risk Factor: high (inhibitor)
Title: Use of NFS detected. Upgrade can't proceed
Summary: NFS is currently not supported by the inplace upgrade.
We have found NFS usage at the following locations:
- NFS shares found in /etc/fstab:
 - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat
 - nest.test.redhat.com:/mnt/qa /mnt/qa
 - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive
 - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist
 - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew
 - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch

Related links:
    - Why does leapp upgrade fail on detecting NFS during upgrade?: https://access.redhat.com/solutions/6964006
Remediation: [hint] Disable NFS temporarily for the upgrade if possible.
Key: 9881b25faceeeaa7a6478bcdac29afd7f6baaaed
----------------------------------------
Risk Factor: high 
Title: Packages available in excluded repositories will not be installed
Summary: 1 packages will be skipped because they are available only in target system repositories that are intentionally excluded from the list of repositories used during the upgrade. See the report message titled "Excluded target system repositories" for details.
The list of these packages:
- jitterentropy-devel (repoid: codeready-builder-for-rhel-9-x86_64-rpms)
Key: 2437e204808f987477c0e9be8e4c95b3a87a9f3e
----------------------------------------
Risk Factor: high 
Title: GRUB2 core will be automatically updated during the upgrade
Summary: On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running "grub2-install" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.
Key: ac7030e05d2ee248d34f08a9fa040b352bc410a3
----------------------------------------
Risk Factor: high 
Title: Remote root logins globally allowed using password
Summary: RHEL9 no longer allows remote root logins, but the server configuration explicitly overrides this default. The configuration file will not be updated and root is still going to be allowed to login with password. This is not recommended and considered as a security risk.
Remediation: [hint] If you depend on remote root logins using passwords, consider setting up a different user for remote administration. Otherwise you can ignore this message.
Key: e738f78bc8f3a84411a4210e3b609057139d1855
----------------------------------------
Risk Factor: high 
Title: Upgrade is unsupported
Summary: Environment variable LEAPP_UNSUPPORTED has been detected. A successful and safe upgrade process cannot be guaranteed. From now on you are continuing at your own risk.

Key: 9e5088e3c1f371e020ec777c3d86578f4be143cf
----------------------------------------
Risk Factor: low 
Title: SElinux will be set to permissive mode
Summary: SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.
Remediation: [hint] Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the "/root/tmp_leapp_py3" SElinux warnings.
Key: 39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f
----------------------------------------
Risk Factor: info 
Title: Excluded target system repositories
Summary: The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.
- codeready-builder-for-rhel-9-x86_64-rhui-rpms
- codeready-builder-for-rhel-9-s390x-rpms
- codeready-builder-beta-for-rhel-9-aarch64-rpms
- crb
- rhui-codeready-builder-for-rhel-9-aarch64-rhui-rpms
- rhui-codeready-builder-for-rhel-9-x86_64-rhui-rpms
- codeready-builder-for-rhel-9-ppc64le-eus-rpms
- codeready-builder-for-rhel-9-aarch64-rpms
- codeready-builder-beta-for-rhel-9-ppc64le-rpms
- codeready-builder-beta-for-rhel-9-s390x-rpms
- codeready-builder-for-rhel-9-x86_64-eus-rpms
- codeready-builder-for-rhel-9-s390x-eus-rpms
- codeready-builder-for-rhel-9-x86_64-rpms
- codeready-builder-beta-for-rhel-9-x86_64-rpms
- codeready-builder-for-rhel-9-rhui-rpms
- codeready-builder-for-rhel-9-ppc64le-rpms
- codeready-builder-for-rhel-9-aarch64-eus-rpms
Remediation: [hint] If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).
Key: 1b9132cb2362ae7830e48eee7811be9527747de8
----------------------------------------
Risk Factor: info 
Title: The upgrade will prepend the Include directive to OpenSSH sshd_config
Summary: OpenSSH server configuration needs to be modified to contain Include directive for the RHEL9 to work properly and integrate with the other parts of the OS. The following snippet will be added to the /etc/ssh/sshd_config during the ApplicationsPhase: `Include /etc/ssh/sshd_config.d/*.conf`
Key: 96da6937c25c6492e4f1228ee146795989fd3718
----------------------------------------
Risk Factor: info 
Title: SElinux relabeling will be scheduled
Summary: SElinux relabeling will be scheduled as the status is permissive/enforcing.
Key: 8fb81863f8413bd617c2a55b69b8e10ff03d7c72
----------------------------------------
", "encoding": "base64", "source": "/var/log/leapp/leapp-report.txt"} TASK [infra.leapp.common : parse_leapp_report | Collect JSON report results] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:21 ok: [managed-node02] => {"changed": false, "content": "{
  "entries": [
    {
      "audience": "sysadmin",
      "detail": {
        "remediations": [
          {
            "context": "If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).",
            "type": "hint"
          }
        ]
      },
      "groups": [
        "repository",
        "failure"
      ],
      "key": "1b9132cb2362ae7830e48eee7811be9527747de8",
      "severity": "info",
      "summary": "The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-for-rhel-9-x86_64-rhui-rpms\n- codeready-builder-for-rhel-9-s390x-rpms\n- codeready-builder-beta-for-rhel-9-aarch64-rpms\n- crb\n- rhui-codeready-builder-for-rhel-9-aarch64-rhui-rpms\n- rhui-codeready-builder-for-rhel-9-x86_64-rhui-rpms\n- codeready-builder-for-rhel-9-ppc64le-eus-rpms\n- codeready-builder-for-rhel-9-aarch64-rpms\n- codeready-builder-beta-for-rhel-9-ppc64le-rpms\n- codeready-builder-beta-for-rhel-9-s390x-rpms\n- codeready-builder-for-rhel-9-x86_64-eus-rpms\n- codeready-builder-for-rhel-9-s390x-eus-rpms\n- codeready-builder-for-rhel-9-x86_64-rpms\n- codeready-builder-beta-for-rhel-9-x86_64-rpms\n- codeready-builder-for-rhel-9-rhui-rpms\n- codeready-builder-for-rhel-9-ppc64le-rpms\n- codeready-builder-for-rhel-9-aarch64-eus-rpms",
      "title": "Excluded target system repositories",
      "timeStamp": "2025-12-17T22:18:06.628803Z",
      "hostname": "managed-node02",
      "actor": "repositories_blacklist",
      "id": "8ddd72e3f9bc2fc2ef99e58d41e980fc8be6df6b6a0a9d308b27f6857e288314"
    },
    {
      "audience": "sysadmin",
      "detail": {
        "related_resources": [
          {
            "scheme": "package",
            "title": "jitterentropy-devel"
          }
        ]
      },
      "groups": [
        "repository"
      ],
      "key": "2437e204808f987477c0e9be8e4c95b3a87a9f3e",
      "severity": "high",
      "summary": "1 packages will be skipped because they are available only in target system repositories that are intentionally excluded from the list of repositories used during the upgrade. See the report message titled \"Excluded target system repositories\" for details.\nThe list of these packages:\n- jitterentropy-devel (repoid: codeready-builder-for-rhel-9-x86_64-rpms)",
      "title": "Packages available in excluded repositories will not be installed",
      "timeStamp": "2025-12-17T22:18:09.115818Z",
      "hostname": "managed-node02",
      "actor": "pes_events_scanner",
      "id": "dbd54b05971c9bb1433330f3aea4c5ad7dae1a39a61758cc2f70a676c344661a"
    },
    {
      "audience": "sysadmin",
      "detail": {
        "external": [
          {
            "title": "Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\"",
            "url": "https://access.redhat.com/solutions/6964304"
          }
        ],
        "related_resources": [
          {
            "scheme": "file",
            "title": "/etc/fstab"
          }
        ],
        "remediations": [
          {
            "context": "Comment out CIFS entries to proceed with the upgrade.",
            "type": "hint"
          }
        ]
      },
      "groups": [
        "filesystem",
        "network",
        "inhibitor"
      ],
      "key": "d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a",
      "severity": "high",
      "summary": "CIFS is currently not supported by the inplace upgrade.",
      "title": "Use of CIFS detected. Upgrade can't proceed",
      "timeStamp": "2025-12-17T22:18:09.837304Z",
      "hostname": "managed-node02",
      "actor": "check_cifs",
      "id": "4d1cb2cd23e364fe30b21a2c96f2bd4a115f09a07739369cb590916e62ae3e63"
    },
    {
      "audience": "sysadmin",
      "detail": {
        "external": [
          {
            "title": "Why does leapp upgrade fail on detecting NFS during upgrade?",
            "url": "https://access.redhat.com/solutions/6964006"
          }
        ],
        "related_resources": [
          {
            "scheme": "file",
            "title": "/etc/fstab"
          }
        ],
        "remediations": [
          {
            "context": "Disable NFS temporarily for the upgrade if possible.",
            "type": "hint"
          }
        ]
      },
      "groups": [
        "filesystem",
        "network",
        "inhibitor"
      ],
      "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed",
      "severity": "high",
      "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch\n",
      "title": "Use of NFS detected. Upgrade can't proceed",
      "timeStamp": "2025-12-17T22:18:10.857381Z",
      "hostname": "managed-node02",
      "actor": "check_nfs",
      "id": "58677013da2599c83d47da51ef91f3d9470e6762ba1c76a41c7e7cf79895f99f"
    },
    {
      "audience": "sysadmin",
      "detail": {
        "related_resources": [
          {
            "scheme": "package",
            "title": "openssh-server"
          },
          {
            "scheme": "file",
            "title": "/etc/ssh/sshd_config"
          }
        ]
      },
      "groups": [
        "authentication",
        "security",
        "network",
        "services"
      ],
      "key": "96da6937c25c6492e4f1228ee146795989fd3718",
      "severity": "info",
      "summary": "OpenSSH server configuration needs to be modified to contain Include directive for the RHEL9 to work properly and integrate with the other parts of the OS. The following snippet will be added to the /etc/ssh/sshd_config during the ApplicationsPhase: `Include /etc/ssh/sshd_config.d/*.conf`",
      "title": "The upgrade will prepend the Include directive to OpenSSH sshd_config",
      "timeStamp": "2025-12-17T22:18:12.193508Z",
      "hostname": "managed-node02",
      "actor": "open_ssh_drop_in_directory_check",
      "id": "d630cf9049f3978817a2cbb1a8f1338eea6eda21447bdbc19004262dc8ca946b"
    },
    {
      "audience": "sysadmin",
      "groups": [
        "boot"
      ],
      "key": "ac7030e05d2ee248d34f08a9fa040b352bc410a3",
      "severity": "high",
      "summary": "On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running \"grub2-install\" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.",
      "title": "GRUB2 core will be automatically updated during the upgrade",
      "timeStamp": "2025-12-17T22:18:12.654213Z",
      "hostname": "managed-node02",
      "actor": "check_grub_core",
      "id": "d88d472e99da8af25d775f8224fe36da0ec2299bbe12c9584b6505aeb12d6503"
    },
    {
      "audience": "sysadmin",
      "detail": {
        "related_resources": [
          {
            "scheme": "package",
            "title": "openssh-server"
          },
          {
            "scheme": "file",
            "title": "/etc/ssh/sshd_config"
          }
        ],
        "remediations": [
          {
            "context": "If you depend on remote root logins using passwords, consider setting up a different user for remote administration. Otherwise you can ignore this message.",
            "type": "hint"
          }
        ]
      },
      "groups": [
        "authentication",
        "security",
        "network",
        "services"
      ],
      "key": "e738f78bc8f3a84411a4210e3b609057139d1855",
      "severity": "high",
      "summary": "RHEL9 no longer allows remote root logins, but the server configuration explicitly overrides this default. The configuration file will not be updated and root is still going to be allowed to login with password. This is not recommended and considered as a security risk.",
      "title": "Remote root logins globally allowed using password",
      "timeStamp": "2025-12-17T22:18:13.119288Z",
      "hostname": "managed-node02",
      "actor": "openssh_permit_root_login",
      "id": "549e48fd929af00ceece1c84dac3e94a550f8ac0c5ffa4a0a6bec3d1687c5281"
    },
    {
      "audience": "sysadmin",
      "groups": [
        "selinux",
        "security"
      ],
      "key": "8fb81863f8413bd617c2a55b69b8e10ff03d7c72",
      "severity": "info",
      "summary": "SElinux relabeling will be scheduled as the status is permissive/enforcing.",
      "title": "SElinux relabeling will be scheduled",
      "timeStamp": "2025-12-17T22:18:13.834740Z",
      "hostname": "managed-node02",
      "actor": "check_se_linux",
      "id": "01acb3b192ad409fc24748b3f88be229d6d730b7e6d383fd465aad2637c87cd3"
    },
    {
      "audience": "sysadmin",
      "detail": {
        "remediations": [
          {
            "context": "Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the \"/root/tmp_leapp_py3\" SElinux warnings.",
            "type": "hint"
          }
        ]
      },
      "groups": [
        "selinux",
        "security"
      ],
      "key": "39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f",
      "severity": "low",
      "summary": "SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.",
      "title": "SElinux will be set to permissive mode",
      "timeStamp": "2025-12-17T22:18:13.837276Z",
      "hostname": "managed-node02",
      "actor": "check_se_linux",
      "id": "f97159902ac589f4c965bb60681167101aa8bb06be5a6e78d59a152051405daa"
    },
    {
      "audience": "sysadmin",
      "groups": [
        "upgrade process",
        "sanity"
      ],
      "key": "9e5088e3c1f371e020ec777c3d86578f4be143cf",
      "severity": "high",
      "summary": "Environment variable LEAPP_UNSUPPORTED has been detected. A successful and safe upgrade process cannot be guaranteed. From now on you are continuing at your own risk.\n",
      "title": "Upgrade is unsupported",
      "timeStamp": "2025-12-17T22:18:13.894600Z",
      "hostname": "managed-node02",
      "actor": "unsupported_upgrade_check",
      "id": "2e10e8102cdda775078120e008f446774c917b964e26d218897f658326436caf"
    }
  ],
  "leapp_run_id": "8528580f-0ad8-4f37-91af-9c7071a155b6"
}
", "encoding": "base64", "source": "/var/log/leapp/leapp-report.json"} TASK [infra.leapp.common : parse_leapp_report | Parse report results] ********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:26 ok: [managed-node02] => {"ansible_facts": {"leapp_report_json": {"entries": [{"actor": "repositories_blacklist", "audience": "sysadmin", "detail": {"remediations": [{"context": "If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).", "type": "hint"}]}, "groups": ["repository", "failure"], "hostname": "managed-node02", "id": "8ddd72e3f9bc2fc2ef99e58d41e980fc8be6df6b6a0a9d308b27f6857e288314", "key": "1b9132cb2362ae7830e48eee7811be9527747de8", "severity": "info", "summary": "The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-for-rhel-9-x86_64-rhui-rpms\n- codeready-builder-for-rhel-9-s390x-rpms\n- codeready-builder-beta-for-rhel-9-aarch64-rpms\n- crb\n- rhui-codeready-builder-for-rhel-9-aarch64-rhui-rpms\n- rhui-codeready-builder-for-rhel-9-x86_64-rhui-rpms\n- codeready-builder-for-rhel-9-ppc64le-eus-rpms\n- codeready-builder-for-rhel-9-aarch64-rpms\n- codeready-builder-beta-for-rhel-9-ppc64le-rpms\n- codeready-builder-beta-for-rhel-9-s390x-rpms\n- codeready-builder-for-rhel-9-x86_64-eus-rpms\n- codeready-builder-for-rhel-9-s390x-eus-rpms\n- codeready-builder-for-rhel-9-x86_64-rpms\n- codeready-builder-beta-for-rhel-9-x86_64-rpms\n- codeready-builder-for-rhel-9-rhui-rpms\n- codeready-builder-for-rhel-9-ppc64le-rpms\n- codeready-builder-for-rhel-9-aarch64-eus-rpms", "timeStamp": "2025-12-17T22:18:06.628803Z", "title": "Excluded target system repositories"}, {"actor": "pes_events_scanner", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "jitterentropy-devel"}]}, "groups": ["repository"], "hostname": "managed-node02", "id": "dbd54b05971c9bb1433330f3aea4c5ad7dae1a39a61758cc2f70a676c344661a", "key": "2437e204808f987477c0e9be8e4c95b3a87a9f3e", "severity": "high", "summary": "1 packages will be skipped because they are available only in target system repositories that are intentionally excluded from the list of repositories used during the upgrade. See the report message titled \"Excluded target system repositories\" for details.\nThe list of these packages:\n- jitterentropy-devel (repoid: codeready-builder-for-rhel-9-x86_64-rpms)", "timeStamp": "2025-12-17T22:18:09.115818Z", "title": "Packages available in excluded repositories will not be installed"}, {"actor": "check_cifs", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\"", "url": "https://access.redhat.com/solutions/6964304"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Comment out CIFS entries to proceed with the upgrade.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node02", "id": "4d1cb2cd23e364fe30b21a2c96f2bd4a115f09a07739369cb590916e62ae3e63", "key": "d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", "severity": "high", "summary": "CIFS is currently not supported by the inplace upgrade.", "timeStamp": "2025-12-17T22:18:09.837304Z", "title": "Use of CIFS detected. Upgrade can't proceed"}, {"actor": "check_nfs", "audience": "sysadmin", "detail": {"external": [{"title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node02", "id": "58677013da2599c83d47da51ef91f3d9470e6762ba1c76a41c7e7cf79895f99f", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch\n", "timeStamp": "2025-12-17T22:18:10.857381Z", "title": "Use of NFS detected. Upgrade can't proceed"}, {"actor": "open_ssh_drop_in_directory_check", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "openssh-server"}, {"scheme": "file", "title": "/etc/ssh/sshd_config"}]}, "groups": ["authentication", "security", "network", "services"], "hostname": "managed-node02", "id": "d630cf9049f3978817a2cbb1a8f1338eea6eda21447bdbc19004262dc8ca946b", "key": "96da6937c25c6492e4f1228ee146795989fd3718", "severity": "info", "summary": "OpenSSH server configuration needs to be modified to contain Include directive for the RHEL9 to work properly and integrate with the other parts of the OS. The following snippet will be added to the /etc/ssh/sshd_config during the ApplicationsPhase: `Include /etc/ssh/sshd_config.d/*.conf`", "timeStamp": "2025-12-17T22:18:12.193508Z", "title": "The upgrade will prepend the Include directive to OpenSSH sshd_config"}, {"actor": "check_grub_core", "audience": "sysadmin", "groups": ["boot"], "hostname": "managed-node02", "id": "d88d472e99da8af25d775f8224fe36da0ec2299bbe12c9584b6505aeb12d6503", "key": "ac7030e05d2ee248d34f08a9fa040b352bc410a3", "severity": "high", "summary": "On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running \"grub2-install\" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.", "timeStamp": "2025-12-17T22:18:12.654213Z", "title": "GRUB2 core will be automatically updated during the upgrade"}, {"actor": "openssh_permit_root_login", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "openssh-server"}, {"scheme": "file", "title": "/etc/ssh/sshd_config"}], "remediations": [{"context": "If you depend on remote root logins using passwords, consider setting up a different user for remote administration. Otherwise you can ignore this message.", "type": "hint"}]}, "groups": ["authentication", "security", "network", "services"], "hostname": "managed-node02", "id": "549e48fd929af00ceece1c84dac3e94a550f8ac0c5ffa4a0a6bec3d1687c5281", "key": "e738f78bc8f3a84411a4210e3b609057139d1855", "severity": "high", "summary": "RHEL9 no longer allows remote root logins, but the server configuration explicitly overrides this default. The configuration file will not be updated and root is still going to be allowed to login with password. This is not recommended and considered as a security risk.", "timeStamp": "2025-12-17T22:18:13.119288Z", "title": "Remote root logins globally allowed using password"}, {"actor": "check_se_linux", "audience": "sysadmin", "groups": ["selinux", "security"], "hostname": "managed-node02", "id": "01acb3b192ad409fc24748b3f88be229d6d730b7e6d383fd465aad2637c87cd3", "key": "8fb81863f8413bd617c2a55b69b8e10ff03d7c72", "severity": "info", "summary": "SElinux relabeling will be scheduled as the status is permissive/enforcing.", "timeStamp": "2025-12-17T22:18:13.834740Z", "title": "SElinux relabeling will be scheduled"}, {"actor": "check_se_linux", "audience": "sysadmin", "detail": {"remediations": [{"context": "Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the \"/root/tmp_leapp_py3\" SElinux warnings.", "type": "hint"}]}, "groups": ["selinux", "security"], "hostname": "managed-node02", "id": "f97159902ac589f4c965bb60681167101aa8bb06be5a6e78d59a152051405daa", "key": "39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f", "severity": "low", "summary": "SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.", "timeStamp": "2025-12-17T22:18:13.837276Z", "title": "SElinux will be set to permissive mode"}, {"actor": "unsupported_upgrade_check", "audience": "sysadmin", "groups": ["upgrade process", "sanity"], "hostname": "managed-node02", "id": "2e10e8102cdda775078120e008f446774c917b964e26d218897f658326436caf", "key": "9e5088e3c1f371e020ec777c3d86578f4be143cf", "severity": "high", "summary": "Environment variable LEAPP_UNSUPPORTED has been detected. A successful and safe upgrade process cannot be guaranteed. From now on you are continuing at your own risk.\n", "timeStamp": "2025-12-17T22:18:13.894600Z", "title": "Upgrade is unsupported"}], "leapp_run_id": "8528580f-0ad8-4f37-91af-9c7071a155b6"}, "leapp_report_txt": ["Risk Factor: high (inhibitor)", "Title: Use of CIFS detected. Upgrade can't proceed", "Summary: CIFS is currently not supported by the inplace upgrade.", "Related links:", " - Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\": https://access.redhat.com/solutions/6964304", "Remediation: [hint] Comment out CIFS entries to proceed with the upgrade.", "Key: d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", "----------------------------------------", "Risk Factor: high (inhibitor)", "Title: Use of NFS detected. Upgrade can't proceed", "Summary: NFS is currently not supported by the inplace upgrade.", "We have found NFS usage at the following locations:", "- NFS shares found in /etc/fstab:", " - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat", " - nest.test.redhat.com:/mnt/qa /mnt/qa", " - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive", " - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist", " - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew", " - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch", "", "Related links:", " - Why does leapp upgrade fail on detecting NFS during upgrade?: https://access.redhat.com/solutions/6964006", "Remediation: [hint] Disable NFS temporarily for the upgrade if possible.", "Key: 9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "----------------------------------------", "Risk Factor: high ", "Title: Packages available in excluded repositories will not be installed", "Summary: 1 packages will be skipped because they are available only in target system repositories that are intentionally excluded from the list of repositories used during the upgrade. See the report message titled \"Excluded target system repositories\" for details.", "The list of these packages:", "- jitterentropy-devel (repoid: codeready-builder-for-rhel-9-x86_64-rpms)", "Key: 2437e204808f987477c0e9be8e4c95b3a87a9f3e", "----------------------------------------", "Risk Factor: high ", "Title: GRUB2 core will be automatically updated during the upgrade", "Summary: On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running \"grub2-install\" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.", "Key: ac7030e05d2ee248d34f08a9fa040b352bc410a3", "----------------------------------------", "Risk Factor: high ", "Title: Remote root logins globally allowed using password", "Summary: RHEL9 no longer allows remote root logins, but the server configuration explicitly overrides this default. The configuration file will not be updated and root is still going to be allowed to login with password. This is not recommended and considered as a security risk.", "Remediation: [hint] If you depend on remote root logins using passwords, consider setting up a different user for remote administration. Otherwise you can ignore this message.", "Key: e738f78bc8f3a84411a4210e3b609057139d1855", "----------------------------------------", "Risk Factor: high ", "Title: Upgrade is unsupported", "Summary: Environment variable LEAPP_UNSUPPORTED has been detected. A successful and safe upgrade process cannot be guaranteed. From now on you are continuing at your own risk.", "", "Key: 9e5088e3c1f371e020ec777c3d86578f4be143cf", "----------------------------------------", "Risk Factor: low ", "Title: SElinux will be set to permissive mode", "Summary: SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.", "Remediation: [hint] Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the \"/root/tmp_leapp_py3\" SElinux warnings.", "Key: 39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f", "----------------------------------------", "Risk Factor: info ", "Title: Excluded target system repositories", "Summary: The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.", "- codeready-builder-for-rhel-9-x86_64-rhui-rpms", "- codeready-builder-for-rhel-9-s390x-rpms", "- codeready-builder-beta-for-rhel-9-aarch64-rpms", "- crb", "- rhui-codeready-builder-for-rhel-9-aarch64-rhui-rpms", "- rhui-codeready-builder-for-rhel-9-x86_64-rhui-rpms", "- codeready-builder-for-rhel-9-ppc64le-eus-rpms", "- codeready-builder-for-rhel-9-aarch64-rpms", "- codeready-builder-beta-for-rhel-9-ppc64le-rpms", "- codeready-builder-beta-for-rhel-9-s390x-rpms", "- codeready-builder-for-rhel-9-x86_64-eus-rpms", "- codeready-builder-for-rhel-9-s390x-eus-rpms", "- codeready-builder-for-rhel-9-x86_64-rpms", "- codeready-builder-beta-for-rhel-9-x86_64-rpms", "- codeready-builder-for-rhel-9-rhui-rpms", "- codeready-builder-for-rhel-9-ppc64le-rpms", "- codeready-builder-for-rhel-9-aarch64-eus-rpms", "Remediation: [hint] If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).", "Key: 1b9132cb2362ae7830e48eee7811be9527747de8", "----------------------------------------", "Risk Factor: info ", "Title: The upgrade will prepend the Include directive to OpenSSH sshd_config", "Summary: OpenSSH server configuration needs to be modified to contain Include directive for the RHEL9 to work properly and integrate with the other parts of the OS. The following snippet will be added to the /etc/ssh/sshd_config during the ApplicationsPhase: `Include /etc/ssh/sshd_config.d/*.conf`", "Key: 96da6937c25c6492e4f1228ee146795989fd3718", "----------------------------------------", "Risk Factor: info ", "Title: SElinux relabeling will be scheduled", "Summary: SElinux relabeling will be scheduled as the status is permissive/enforcing.", "Key: 8fb81863f8413bd617c2a55b69b8e10ff03d7c72", "----------------------------------------", ""]}, "changed": false} TASK [infra.leapp.common : parse_leapp_report | Check for inhibitors] ********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:32 skipping: [managed-node02] => (item={'audience': 'sysadmin', 'detail': {'remediations': [{'context': 'If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).', 'type': 'hint'}]}, 'groups': ['repository', 'failure'], 'key': '1b9132cb2362ae7830e48eee7811be9527747de8', 'severity': 'info', 'summary': 'The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-for-rhel-9-x86_64-rhui-rpms\n- codeready-builder-for-rhel-9-s390x-rpms\n- codeready-builder-beta-for-rhel-9-aarch64-rpms\n- crb\n- rhui-codeready-builder-for-rhel-9-aarch64-rhui-rpms\n- rhui-codeready-builder-for-rhel-9-x86_64-rhui-rpms\n- codeready-builder-for-rhel-9-ppc64le-eus-rpms\n- codeready-builder-for-rhel-9-aarch64-rpms\n- codeready-builder-beta-for-rhel-9-ppc64le-rpms\n- codeready-builder-beta-for-rhel-9-s390x-rpms\n- codeready-builder-for-rhel-9-x86_64-eus-rpms\n- codeready-builder-for-rhel-9-s390x-eus-rpms\n- codeready-builder-for-rhel-9-x86_64-rpms\n- codeready-builder-beta-for-rhel-9-x86_64-rpms\n- codeready-builder-for-rhel-9-rhui-rpms\n- codeready-builder-for-rhel-9-ppc64le-rpms\n- codeready-builder-for-rhel-9-aarch64-eus-rpms', 'title': 'Excluded target system repositories', 'timeStamp': '2025-12-17T22:18:06.628803Z', 'hostname': 'managed-node02', 'actor': 'repositories_blacklist', 'id': '8ddd72e3f9bc2fc2ef99e58d41e980fc8be6df6b6a0a9d308b27f6857e288314'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "repositories_blacklist", "audience": "sysadmin", "detail": {"remediations": [{"context": "If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).", "type": "hint"}]}, "groups": ["repository", "failure"], "hostname": "managed-node02", "id": "8ddd72e3f9bc2fc2ef99e58d41e980fc8be6df6b6a0a9d308b27f6857e288314", "key": "1b9132cb2362ae7830e48eee7811be9527747de8", "severity": "info", "summary": "The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-for-rhel-9-x86_64-rhui-rpms\n- codeready-builder-for-rhel-9-s390x-rpms\n- codeready-builder-beta-for-rhel-9-aarch64-rpms\n- crb\n- rhui-codeready-builder-for-rhel-9-aarch64-rhui-rpms\n- rhui-codeready-builder-for-rhel-9-x86_64-rhui-rpms\n- codeready-builder-for-rhel-9-ppc64le-eus-rpms\n- codeready-builder-for-rhel-9-aarch64-rpms\n- codeready-builder-beta-for-rhel-9-ppc64le-rpms\n- codeready-builder-beta-for-rhel-9-s390x-rpms\n- codeready-builder-for-rhel-9-x86_64-eus-rpms\n- codeready-builder-for-rhel-9-s390x-eus-rpms\n- codeready-builder-for-rhel-9-x86_64-rpms\n- codeready-builder-beta-for-rhel-9-x86_64-rpms\n- codeready-builder-for-rhel-9-rhui-rpms\n- codeready-builder-for-rhel-9-ppc64le-rpms\n- codeready-builder-for-rhel-9-aarch64-eus-rpms", "timeStamp": "2025-12-17T22:18:06.628803Z", "title": "Excluded target system repositories"}, "skip_reason": "Conditional result was False"} skipping: [managed-node02] => (item={'audience': 'sysadmin', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'jitterentropy-devel'}]}, 'groups': ['repository'], 'key': '2437e204808f987477c0e9be8e4c95b3a87a9f3e', 'severity': 'high', 'summary': '1 packages will be skipped because they are available only in target system repositories that are intentionally excluded from the list of repositories used during the upgrade. See the report message titled "Excluded target system repositories" for details.\nThe list of these packages:\n- jitterentropy-devel (repoid: codeready-builder-for-rhel-9-x86_64-rpms)', 'title': 'Packages available in excluded repositories will not be installed', 'timeStamp': '2025-12-17T22:18:09.115818Z', 'hostname': 'managed-node02', 'actor': 'pes_events_scanner', 'id': 'dbd54b05971c9bb1433330f3aea4c5ad7dae1a39a61758cc2f70a676c344661a'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "pes_events_scanner", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "jitterentropy-devel"}]}, "groups": ["repository"], "hostname": "managed-node02", "id": "dbd54b05971c9bb1433330f3aea4c5ad7dae1a39a61758cc2f70a676c344661a", "key": "2437e204808f987477c0e9be8e4c95b3a87a9f3e", "severity": "high", "summary": "1 packages will be skipped because they are available only in target system repositories that are intentionally excluded from the list of repositories used during the upgrade. See the report message titled \"Excluded target system repositories\" for details.\nThe list of these packages:\n- jitterentropy-devel (repoid: codeready-builder-for-rhel-9-x86_64-rpms)", "timeStamp": "2025-12-17T22:18:09.115818Z", "title": "Packages available in excluded repositories will not be installed"}, "skip_reason": "Conditional result was False"} ok: [managed-node02] => (item={'audience': 'sysadmin', 'detail': {'external': [{'title': 'Leapp upgrade failed with error "Inhibitor: Use of CIFS detected. Upgrade cannot proceed"', 'url': 'https://access.redhat.com/solutions/6964304'}], 'related_resources': [{'scheme': 'file', 'title': '/etc/fstab'}], 'remediations': [{'context': 'Comment out CIFS entries to proceed with the upgrade.', 'type': 'hint'}]}, 'groups': ['filesystem', 'network', 'inhibitor'], 'key': 'd0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a', 'severity': 'high', 'summary': 'CIFS is currently not supported by the inplace upgrade.', 'title': "Use of CIFS detected. Upgrade can't proceed", 'timeStamp': '2025-12-17T22:18:09.837304Z', 'hostname': 'managed-node02', 'actor': 'check_cifs', 'id': '4d1cb2cd23e364fe30b21a2c96f2bd4a115f09a07739369cb590916e62ae3e63'}) => {"ansible_facts": {"leapp_inhibitors": [{"actor": "check_cifs", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\"", "url": "https://access.redhat.com/solutions/6964304"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Comment out CIFS entries to proceed with the upgrade.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node02", "id": "4d1cb2cd23e364fe30b21a2c96f2bd4a115f09a07739369cb590916e62ae3e63", "key": "d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", "severity": "high", "summary": "CIFS is currently not supported by the inplace upgrade.", "timeStamp": "2025-12-17T22:18:09.837304Z", "title": "Use of CIFS detected. Upgrade can't proceed"}], "upgrade_inhibited": true}, "ansible_loop_var": "item", "changed": false, "item": {"actor": "check_cifs", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\"", "url": "https://access.redhat.com/solutions/6964304"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Comment out CIFS entries to proceed with the upgrade.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node02", "id": "4d1cb2cd23e364fe30b21a2c96f2bd4a115f09a07739369cb590916e62ae3e63", "key": "d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", "severity": "high", "summary": "CIFS is currently not supported by the inplace upgrade.", "timeStamp": "2025-12-17T22:18:09.837304Z", "title": "Use of CIFS detected. Upgrade can't proceed"}} ok: [managed-node02] => (item={'audience': 'sysadmin', 'detail': {'external': [{'title': 'Why does leapp upgrade fail on detecting NFS during upgrade?', 'url': 'https://access.redhat.com/solutions/6964006'}], 'related_resources': [{'scheme': 'file', 'title': '/etc/fstab'}], 'remediations': [{'context': 'Disable NFS temporarily for the upgrade if possible.', 'type': 'hint'}]}, 'groups': ['filesystem', 'network', 'inhibitor'], 'key': '9881b25faceeeaa7a6478bcdac29afd7f6baaaed', 'severity': 'high', 'summary': 'NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch\n', 'title': "Use of NFS detected. Upgrade can't proceed", 'timeStamp': '2025-12-17T22:18:10.857381Z', 'hostname': 'managed-node02', 'actor': 'check_nfs', 'id': '58677013da2599c83d47da51ef91f3d9470e6762ba1c76a41c7e7cf79895f99f'}) => {"ansible_facts": {"leapp_inhibitors": [{"actor": "check_cifs", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\"", "url": "https://access.redhat.com/solutions/6964304"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Comment out CIFS entries to proceed with the upgrade.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node02", "id": "4d1cb2cd23e364fe30b21a2c96f2bd4a115f09a07739369cb590916e62ae3e63", "key": "d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", "severity": "high", "summary": "CIFS is currently not supported by the inplace upgrade.", "timeStamp": "2025-12-17T22:18:09.837304Z", "title": "Use of CIFS detected. Upgrade can't proceed"}, {"actor": "check_nfs", "audience": "sysadmin", "detail": {"external": [{"title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node02", "id": "58677013da2599c83d47da51ef91f3d9470e6762ba1c76a41c7e7cf79895f99f", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch\n", "timeStamp": "2025-12-17T22:18:10.857381Z", "title": "Use of NFS detected. Upgrade can't proceed"}], "upgrade_inhibited": true}, "ansible_loop_var": "item", "changed": false, "item": {"actor": "check_nfs", "audience": "sysadmin", "detail": {"external": [{"title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node02", "id": "58677013da2599c83d47da51ef91f3d9470e6762ba1c76a41c7e7cf79895f99f", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch\n", "timeStamp": "2025-12-17T22:18:10.857381Z", "title": "Use of NFS detected. Upgrade can't proceed"}} skipping: [managed-node02] => (item={'audience': 'sysadmin', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'openssh-server'}, {'scheme': 'file', 'title': '/etc/ssh/sshd_config'}]}, 'groups': ['authentication', 'security', 'network', 'services'], 'key': '96da6937c25c6492e4f1228ee146795989fd3718', 'severity': 'info', 'summary': 'OpenSSH server configuration needs to be modified to contain Include directive for the RHEL9 to work properly and integrate with the other parts of the OS. The following snippet will be added to the /etc/ssh/sshd_config during the ApplicationsPhase: `Include /etc/ssh/sshd_config.d/*.conf`', 'title': 'The upgrade will prepend the Include directive to OpenSSH sshd_config', 'timeStamp': '2025-12-17T22:18:12.193508Z', 'hostname': 'managed-node02', 'actor': 'open_ssh_drop_in_directory_check', 'id': 'd630cf9049f3978817a2cbb1a8f1338eea6eda21447bdbc19004262dc8ca946b'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "open_ssh_drop_in_directory_check", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "openssh-server"}, {"scheme": "file", "title": "/etc/ssh/sshd_config"}]}, "groups": ["authentication", "security", "network", "services"], "hostname": "managed-node02", "id": "d630cf9049f3978817a2cbb1a8f1338eea6eda21447bdbc19004262dc8ca946b", "key": "96da6937c25c6492e4f1228ee146795989fd3718", "severity": "info", "summary": "OpenSSH server configuration needs to be modified to contain Include directive for the RHEL9 to work properly and integrate with the other parts of the OS. The following snippet will be added to the /etc/ssh/sshd_config during the ApplicationsPhase: `Include /etc/ssh/sshd_config.d/*.conf`", "timeStamp": "2025-12-17T22:18:12.193508Z", "title": "The upgrade will prepend the Include directive to OpenSSH sshd_config"}, "skip_reason": "Conditional result was False"} skipping: [managed-node02] => (item={'audience': 'sysadmin', 'groups': ['boot'], 'key': 'ac7030e05d2ee248d34f08a9fa040b352bc410a3', 'severity': 'high', 'summary': 'On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running "grub2-install" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.', 'title': 'GRUB2 core will be automatically updated during the upgrade', 'timeStamp': '2025-12-17T22:18:12.654213Z', 'hostname': 'managed-node02', 'actor': 'check_grub_core', 'id': 'd88d472e99da8af25d775f8224fe36da0ec2299bbe12c9584b6505aeb12d6503'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_grub_core", "audience": "sysadmin", "groups": ["boot"], "hostname": "managed-node02", "id": "d88d472e99da8af25d775f8224fe36da0ec2299bbe12c9584b6505aeb12d6503", "key": "ac7030e05d2ee248d34f08a9fa040b352bc410a3", "severity": "high", "summary": "On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running \"grub2-install\" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.", "timeStamp": "2025-12-17T22:18:12.654213Z", "title": "GRUB2 core will be automatically updated during the upgrade"}, "skip_reason": "Conditional result was False"} skipping: [managed-node02] => (item={'audience': 'sysadmin', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'openssh-server'}, {'scheme': 'file', 'title': '/etc/ssh/sshd_config'}], 'remediations': [{'context': 'If you depend on remote root logins using passwords, consider setting up a different user for remote administration. Otherwise you can ignore this message.', 'type': 'hint'}]}, 'groups': ['authentication', 'security', 'network', 'services'], 'key': 'e738f78bc8f3a84411a4210e3b609057139d1855', 'severity': 'high', 'summary': 'RHEL9 no longer allows remote root logins, but the server configuration explicitly overrides this default. The configuration file will not be updated and root is still going to be allowed to login with password. This is not recommended and considered as a security risk.', 'title': 'Remote root logins globally allowed using password', 'timeStamp': '2025-12-17T22:18:13.119288Z', 'hostname': 'managed-node02', 'actor': 'openssh_permit_root_login', 'id': '549e48fd929af00ceece1c84dac3e94a550f8ac0c5ffa4a0a6bec3d1687c5281'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "openssh_permit_root_login", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "openssh-server"}, {"scheme": "file", "title": "/etc/ssh/sshd_config"}], "remediations": [{"context": "If you depend on remote root logins using passwords, consider setting up a different user for remote administration. Otherwise you can ignore this message.", "type": "hint"}]}, "groups": ["authentication", "security", "network", "services"], "hostname": "managed-node02", "id": "549e48fd929af00ceece1c84dac3e94a550f8ac0c5ffa4a0a6bec3d1687c5281", "key": "e738f78bc8f3a84411a4210e3b609057139d1855", "severity": "high", "summary": "RHEL9 no longer allows remote root logins, but the server configuration explicitly overrides this default. The configuration file will not be updated and root is still going to be allowed to login with password. This is not recommended and considered as a security risk.", "timeStamp": "2025-12-17T22:18:13.119288Z", "title": "Remote root logins globally allowed using password"}, "skip_reason": "Conditional result was False"} skipping: [managed-node02] => (item={'audience': 'sysadmin', 'groups': ['selinux', 'security'], 'key': '8fb81863f8413bd617c2a55b69b8e10ff03d7c72', 'severity': 'info', 'summary': 'SElinux relabeling will be scheduled as the status is permissive/enforcing.', 'title': 'SElinux relabeling will be scheduled', 'timeStamp': '2025-12-17T22:18:13.834740Z', 'hostname': 'managed-node02', 'actor': 'check_se_linux', 'id': '01acb3b192ad409fc24748b3f88be229d6d730b7e6d383fd465aad2637c87cd3'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_se_linux", "audience": "sysadmin", "groups": ["selinux", "security"], "hostname": "managed-node02", "id": "01acb3b192ad409fc24748b3f88be229d6d730b7e6d383fd465aad2637c87cd3", "key": "8fb81863f8413bd617c2a55b69b8e10ff03d7c72", "severity": "info", "summary": "SElinux relabeling will be scheduled as the status is permissive/enforcing.", "timeStamp": "2025-12-17T22:18:13.834740Z", "title": "SElinux relabeling will be scheduled"}, "skip_reason": "Conditional result was False"} skipping: [managed-node02] => (item={'audience': 'sysadmin', 'detail': {'remediations': [{'context': 'Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the "/root/tmp_leapp_py3" SElinux warnings.', 'type': 'hint'}]}, 'groups': ['selinux', 'security'], 'key': '39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f', 'severity': 'low', 'summary': 'SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.', 'title': 'SElinux will be set to permissive mode', 'timeStamp': '2025-12-17T22:18:13.837276Z', 'hostname': 'managed-node02', 'actor': 'check_se_linux', 'id': 'f97159902ac589f4c965bb60681167101aa8bb06be5a6e78d59a152051405daa'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_se_linux", "audience": "sysadmin", "detail": {"remediations": [{"context": "Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the \"/root/tmp_leapp_py3\" SElinux warnings.", "type": "hint"}]}, "groups": ["selinux", "security"], "hostname": "managed-node02", "id": "f97159902ac589f4c965bb60681167101aa8bb06be5a6e78d59a152051405daa", "key": "39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f", "severity": "low", "summary": "SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.", "timeStamp": "2025-12-17T22:18:13.837276Z", "title": "SElinux will be set to permissive mode"}, "skip_reason": "Conditional result was False"} skipping: [managed-node02] => (item={'audience': 'sysadmin', 'groups': ['upgrade process', 'sanity'], 'key': '9e5088e3c1f371e020ec777c3d86578f4be143cf', 'severity': 'high', 'summary': 'Environment variable LEAPP_UNSUPPORTED has been detected. A successful and safe upgrade process cannot be guaranteed. From now on you are continuing at your own risk.\n', 'title': 'Upgrade is unsupported', 'timeStamp': '2025-12-17T22:18:13.894600Z', 'hostname': 'managed-node02', 'actor': 'unsupported_upgrade_check', 'id': '2e10e8102cdda775078120e008f446774c917b964e26d218897f658326436caf'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "unsupported_upgrade_check", "audience": "sysadmin", "groups": ["upgrade process", "sanity"], "hostname": "managed-node02", "id": "2e10e8102cdda775078120e008f446774c917b964e26d218897f658326436caf", "key": "9e5088e3c1f371e020ec777c3d86578f4be143cf", "severity": "high", "summary": "Environment variable LEAPP_UNSUPPORTED has been detected. A successful and safe upgrade process cannot be guaranteed. From now on you are continuing at your own risk.\n", "timeStamp": "2025-12-17T22:18:13.894600Z", "title": "Upgrade is unsupported"}, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : parse_leapp_report | Collect inhibitors] ************ task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:44 ok: [managed-node02] => {"changed": false, "cmd": ["awk", "/\\(inhibitor\\)/,/^-------/", "/var/log/leapp/leapp-report.txt"], "delta": "0:00:00.003635", "end": "2025-12-17 17:18:36.785462", "failed_when_result": false, "msg": "", "rc": 0, "start": "2025-12-17 17:18:36.781827", "stderr": "", "stderr_lines": [], "stdout": "Risk Factor: high (inhibitor)\nTitle: Use of CIFS detected. Upgrade can't proceed\nSummary: CIFS is currently not supported by the inplace upgrade.\nRelated links:\n - Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\": https://access.redhat.com/solutions/6964304\nRemediation: [hint] Comment out CIFS entries to proceed with the upgrade.\nKey: d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a\n----------------------------------------\nRisk Factor: high (inhibitor)\nTitle: Use of NFS detected. Upgrade can't proceed\nSummary: NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch\n\nRelated links:\n - Why does leapp upgrade fail on detecting NFS during upgrade?: https://access.redhat.com/solutions/6964006\nRemediation: [hint] Disable NFS temporarily for the upgrade if possible.\nKey: 9881b25faceeeaa7a6478bcdac29afd7f6baaaed\n----------------------------------------", "stdout_lines": ["Risk Factor: high (inhibitor)", "Title: Use of CIFS detected. Upgrade can't proceed", "Summary: CIFS is currently not supported by the inplace upgrade.", "Related links:", " - Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\": https://access.redhat.com/solutions/6964304", "Remediation: [hint] Comment out CIFS entries to proceed with the upgrade.", "Key: d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", "----------------------------------------", "Risk Factor: high (inhibitor)", "Title: Use of NFS detected. Upgrade can't proceed", "Summary: NFS is currently not supported by the inplace upgrade.", "We have found NFS usage at the following locations:", "- NFS shares found in /etc/fstab:", " - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat", " - nest.test.redhat.com:/mnt/qa /mnt/qa", " - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive", " - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist", " - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew", " - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch", "", "Related links:", " - Why does leapp upgrade fail on detecting NFS during upgrade?: https://access.redhat.com/solutions/6964006", "Remediation: [hint] Disable NFS temporarily for the upgrade if possible.", "Key: 9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "----------------------------------------"]} TASK [infra.leapp.common : parse_leapp_report | Collect high errors] *********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:53 ok: [managed-node02] => {"changed": false, "cmd": ["awk", "/high \\(error\\)/,/^-------/", "/var/log/leapp/leapp-report.txt"], "delta": "0:00:00.003674", "end": "2025-12-17 17:18:37.134325", "failed_when_result": false, "msg": "", "rc": 0, "start": "2025-12-17 17:18:37.130651", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} TASK [infra.leapp.analysis : Set stats for leapp_inhibitors] ******************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/main.yml:17 ok: [managed-node02] => {"ansible_stats": {"aggregate": true, "data": {"leapp_inhibitors": [{"actor": "check_cifs", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\"", "url": "https://access.redhat.com/solutions/6964304"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Comment out CIFS entries to proceed with the upgrade.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node02", "id": "4d1cb2cd23e364fe30b21a2c96f2bd4a115f09a07739369cb590916e62ae3e63", "key": "d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", "severity": "high", "summary": "CIFS is currently not supported by the inplace upgrade.", "timeStamp": "2025-12-17T22:18:09.837304Z", "title": "Use of CIFS detected. Upgrade can't proceed"}, {"actor": "check_nfs", "audience": "sysadmin", "detail": {"external": [{"title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node02", "id": "58677013da2599c83d47da51ef91f3d9470e6762ba1c76a41c7e7cf79895f99f", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch\n", "timeStamp": "2025-12-17T22:18:10.857381Z", "title": "Use of NFS detected. Upgrade can't proceed"}]}, "per_host": false}, "changed": false} TASK [infra.leapp.analysis : Notify analysis report is done handler] *********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/main.yml:22 NOTIFIED HANDLER infra.leapp.analysis : Preupgrade analysis report is done for managed-node02 NOTIFIED HANDLER infra.leapp.analysis : Display inhibitors for managed-node02 NOTIFIED HANDLER infra.leapp.analysis : Display errors for managed-node02 changed: [managed-node02] => {"changed": true, "msg": "All assertions passed"} TASK [common_upgrade_tasks | Flush handlers] *********************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:25 META: triggered running handlers for managed-node02 RUNNING HANDLER [infra.leapp.common : Check for log file] ********************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:3 ok: [managed-node02] => {"changed": false, "stat": {"atime": 1766009835.0838752, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 40, "charset": "us-ascii", "checksum": "840aea60e196a77b5a44ba0244f49ef1ca96c751", "ctime": 1766009894.8449173, "dev": 51715, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 771752084, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1766009894.8449173, "nlink": 1, "path": "/var/log/ripu/ripu.log", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 17012, "uid": 0, "version": "1171273563", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} RUNNING HANDLER [infra.leapp.common : Add end time to log file] **************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:9 changed: [managed-node02] => {"backup": "", "changed": true, "msg": "line added"} RUNNING HANDLER [infra.leapp.common : Slurp ripu.log file] ********************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:19 ok: [managed-node02] => {"changed": false, "content": "RIPU preupgrade analysis
Job started at 2025-12-17T22:17:14Z

============================================================
                    UNSUPPORTED UPGRADE                     
============================================================

Variable LEAPP_UNSUPPORTED has been detected. Proceeding at your own risk.
Development variables have been detected:
- LEAPP_DEVEL_RPMS_ALL_SIGNED=1

============================================================
                    UNSUPPORTED UPGRADE                     
============================================================

==> Processing phase `configuration_phase`
====> * ipu_workflow_config
        IPU workflow config actor
==> Processing phase `FactsCollection`
====> * repository_mapping
        Produces message containing repository mapping based on provided file.
====> * scan_target_os_image
        Scans the provided target OS ISO image to use as a content source for the IPU, if any.
====> * root_scanner
        Scan the system root directory and produce a message containing
====> * scanmemory
        Scan Memory of the machine.
====> * nis_scanner
        Collect information about the NIS packages configuration.
====> * persistentnetnames
        Get network interface information for physical ethernet interfaces of the original system.
====> * scan_grub_device_name
        Find the name of the block devices where GRUB is located
====> * scan_systemd_source
        Provides info about systemd on the source system
====> * get_enabled_modules
        Provides data about which module streams are enabled on the source system.
====> * roce_scanner
        Detect active RoCE NICs on IBM Z machines.
====> * network_manager_connection_scanner
        Scan NetworkManager connection keyfiles
====> * scanzfcp
        In case of s390x architecture, check whether ZFCP is used.
====> * storage_scanner
        Provides data about storage settings.
====> * scanclienablerepo
        Produce CustomTargetRepository based on the LEAPP_ENABLE_REPOS in config.
====> * firewalld_collect_global_config
        This actor reads firewalld's configuration and produces Model
====> * open_ssl_config_scanner
        Read an OpenSSL configuration file for further analysis.
====> * scan_sap_hana
        Gathers information related to SAP HANA instances on the system.
====> * network_manager_read_config
        Provides data about NetworkManager configuration.
====> * xorgdrvfacts8to9
        Check the journal logs for deprecated Xorg drivers.
====> * check_custom_network_scripts
        Check the existence of custom network-scripts and warn user about possible
====> * scan_files_for_target_userspace
        Scan the source system and identify files that will be copied into the target userspace when it is created.
====> * scan_kernel_cmdline
        Scan the kernel command line of the booted system.
====> * udevadm_info
        Produces data exported by the "udevadm info" command.
====> * biosdevname
        Enable biosdevname on the target RHEL system if all interfaces on the source RHEL
====> * copy_dnf_conf_into_target_userspace
        Copy dnf.conf into target userspace
====> * rpm_scanner
        Provides data about installed RPM Packages.
====> * scan_custom_modifications_actor
        Collects information about files in leapp directories that have been modified or newly added.
====> * sssd_facts_8to9
        Check SSSD configuration for changes in RHEL9 and report them in model.
====> * read_openssh_config
        Collect information about the OpenSSH configuration.
====> * firewalld_collect_used_object_names
        This actor reads firewalld's configuration and produces Model
====> * scan_subscription_manager_info
        Scans the current system for subscription manager information
====> * scan_grub_config
        Scan grub configuration files for errors.
====> * scandasd
        In case of s390x architecture, check whether DASD is used.
====> * distribution_signed_rpm_scanner
        Provide data about distribution signed & third-party RPM packages.
====> * scan_fips
        Determine whether the source system has FIPS enabled.
====> * scan_source_files
        Scan files (explicitly specified) of the source system.
====> * register_ruby_irb_adjustment
        Register a workaround to allow rubygem-irb's directory -> symlink conversion.
====> * remove_obsolete_gpg_keys
        Remove obsoleted RPM GPG keys.
====> * rpm_transaction_config_tasks_collector
        Provides additional RPM transaction tasks from /etc/leapp/transaction.
====> * scan_third_party_target_python_modules
        Detect third-party target Python modules and RPMs on the source system.
====> * trusted_gpg_keys_scanner
        Scan for trusted GPG keys.
====> * scan_pkg_manager
        Provides data about package manager (yum/dnf)
====> * scan_dnf_pluginpath
        Scans DNF configuration for custom pluginpath option.
====> * persistentnetnamesdisable
        Disable systemd-udevd persistent network naming on machine with single eth0 NIC
====> * scancryptopolicies
        Scan information about system wide set crypto policies including:
====> * ifcfg_scanner
        Scan ifcfg files with legacy network configuration
====> * scan_custom_repofile
        Scan the custom /etc/leapp/files/leapp_upgrade_repositories.repo repo file.
====> * transaction_workarounds
        Provides additional RPM transaction tasks based on bundled RPM packages.
====> * luks_scanner
        Provides data about active LUKS devices.
====> * load_device_driver_deprecation_data
        Loads deprecation data for drivers and devices (PCI & CPU)
====> * scanblacklistca
        Scan the file system for distrusted CA's in the blacklist directory.
====> * system_facts
        Provides data about many facts from system.
====> * pci_devices_scanner
        Provides data about existing PCI Devices.
====> * scan_source_boot_entry
        Scan the default boot entry of the source system.
====> * xfs_info_scanner
        This actor scans all mounted mountpoints for XFS information.
====> * scancpu
        Scan CPUs of the machine.
====> * used_repository_scanner
        Scan used enabled repositories
====> * scan_hybrid_image_azure
        Check if the system is using Azure hybrid image.
====> * get_installed_desktops
        Actor checks if kde or gnome desktop environments
====> * enable_lvm_autoactivation
        Enable LVM autoactivation in upgrade initramfs.
====> * scan_source_kernel
        Scan the source system kernel.
====> * checkrhui
        Check if system is using RHUI infrastructure (on public cloud) and send messages to
====> * vdo_conversion_scanner
        Provides conversion info about VDO devices.
====> * multipath_conf_read_8to9
        Read multipath configuration files and extract the necessary information
====> * satellite_upgrade_facts
        Report which Satellite packages require updates and how to handle PostgreSQL data
====> * satellite_upgrade_services
        Reconfigure Satellite services
====> * scan_dynamic_linker_configuration
        Scan the dynamic linker configuration and find modifications.
====> * ipa_scanner
        Scan system for ipa-client and ipa-server status
====> * selinuxcontentscanner
        Scan the system for any SELinux customizations
====> * repositories_blacklist
        Exclude target repositories provided by Red Hat without support.
====> * detect_kernel_drivers
        Matches all currently loaded kernel drivers against known deprecated and removed drivers.
====> * scan_default_initramfs
        Scan details of the default boot entry's initramfs image.
====> * pes_events_scanner
        Provides data about package events from Package Evolution Service.
====> * setuptargetrepos
        Produces list of repositories that should be available to be used during IPU process.
==> Processing phase `Checks`
====> * check_vdo
        Check if VDO devices need to be migrated to lvm management.
====> * check_bls_grub_onppc64
        Check whether GRUB config is BLS aware on RHEL 8 ppc64le systems
====> * cephvolumescan
        Retrieves the list of encrypted Ceph OSD
====> * check_ifcfg
        Ensures that ifcfg files are compatible with NetworkManager
====> * check_skipped_repositories
        Produces a report if any repositories enabled on the system are going to be skipped.
====> * nis_check
        Checks if any of NIS components is installed and configured
====> * xorgdrvcheck8to9
        Warn if Xorg deprecated drivers are in use.
====> * sssd_check_8to9
        Check SSSD configuration for changes in RHEL9 and report them in model.
====> * check_cifs
        Check if CIFS filesystem is in use. If yes, inhibit the upgrade process.
====> * mysql_check
        Actor checking for presence of MySQL installation.
====> * open_ssl_config_check
        The OpenSSL configuration changed between RHEL8 and RHEL9 significantly with the rebase to
====> * mariadb_check
        Actor checking for presence of MariaDB installation.
====> * check_target_iso
        Check that the provided target ISO is a valid ISO image and is located on a persistent partition.
====> * efi_check_boot
        Adjust EFI boot entry for first reboot
====> * emit_net_naming_scheme
        Emit necessary modifications of the upgrade environment and target command line to use net.naming-scheme.
====> * check_third_party_target_python_modules
        Produces a report if any third-party target Python modules are detected on the source system.
====> * bacula_check
        Actor checking for presence of Bacula installation.
====> * postgresql_check
        Actor checking for presence of PostgreSQL installation.
====> * check_systemd_broken_symlinks
        Check whether some systemd symlinks are broken
====> * check_grubenv_to_file
        Check whether grubenv is a symlink on Azure hybrid images using BIOS.
====> * network_deprecations
        Ensures that network configuration doesn't rely on unsupported settings
====> * check_nfs
        Check if NFS filesystem is in use. If yes, inhibit the upgrade process.
====> * check_persistent_mounts
        Check if mounts required to be persistent are mounted in persistent fashion.
====> * distribution_signed_rpm_check
        Check if there are any packages that are not signed by distribution GPG keys.
====> * check_custom_modifications_actor
        Checks CustomModifications messages and produces a report about files in leapp directories that have been
====> * check_kpatch
        Carry over kpatch-dnf and it's config into the container
====> * check_root_symlinks
        Check if the symlinks /bin and /lib are relative, not absolute.
====> * check_openssl_conf
        Check whether the openssl configuration and openssl-IBMCA.
====> * firewalld_check_service_tftp_client
        This actor will inhibit if firewalld's configuration is using service
====> * check_luks
        Check if any encrypted partitions are in use and whether they are supported for the upgrade.
====> * check_nvidia_proprietary_driver
        Check if NVIDIA proprietary driver is in use. If yes, inhibit the upgrade process.
====> * multipath_conf_check_8to9
        Checks if changes to the multipath configuration files are necessary
====> * check_consumed_assets
        Check whether Leapp is using correct data assets.
====> * crypto_policies_check
        This actor consumes previously gathered information about crypto policies on the source
====> * check_microarchitecture
        Inhibit if RHEL9 microarchitecture requirements are not satisfied
====> * check_yum_plugins_enabled
        Checks that the required yum plugins are enabled.
====> * check_installed_kernels
        Inhibit IPU (in-place upgrade) when installed kernels conflict with a safe upgrade.
====> * open_ssh_drop_in_directory_check
        Trigger a notice that the main sshd_config will be updated to contain
====> * check_fips
        Inhibit upgrade if FIPS is detected as enabled.
====> * roce_check
        Check whether RoCE is used on the system and well configured for the upgrade.
====> * check_sap_hana
        If SAP HANA has been detected, several checks are performed to ensure a successful upgrade.
====> * firewalld_check_allow_zone_drifting
        This actor will check if AllowZoneDrifting=yes in firewalld.conf. This
====> * check_target_version
        Check that the target system version is supported by the upgrade process.
====> * check_insights_auto_register
        Checks if system can be automatically registered into Red Hat Lightspeed
====> * detect_grub_config_error
        Check grub configuration for various errors.
====> * check_grub_core
        Check whether we are on legacy (BIOS) system and instruct Leapp to upgrade GRUB core
====> * check_valid_grubcfg_hybrid
        Check potential for boot failures in Azure Gen1 VMs due to invalid grubcfg
====> * check_rhsmsku
        Ensure the system is subscribed to the subscription manager
====> * open_ssh_subsystem_sftp
        The RHEL9 changes the SCP to use SFTP protocol internally. The both RHEL8 and RHEL9
====> * checkmemory
        The actor check the size of RAM against RHEL8 minimal hardware requirements
====> * check_etc_releasever
        Check releasever info and provide a guidance based on the facts
====> * check_fstab_mount_order
        Checks order of entries in /etc/fstab based on their mount point and inhibits upgrade if overshadowing is detected.
====> * check_dynamic_linker_configuration
        Check for customization of dynamic linker configuration.
====> * openssh_permit_root_login
        OpenSSH no longer allows root logins with password.
====> * checktargetrepos
        Check whether target dnf repositories are specified on RHEL.
====> * check_mount_options
        Check for mount options preventing the upgrade.
====> * check_boot_avail_space
        Check if at least 100Mib of available space on /boot. If not, inhibit the upgrade process.
====> * dotnet_unsupported_versions_check
        Check for installed .NET versions that are no longer supported.
====> * check_detected_devices_and_drivers
        Checks whether or not detected devices and drivers are usable on the target system.
====> * checkblacklistca
        No documentation has been provided for the checkblacklistca actor.
====> * check_se_linux
        Check SELinux status and produce decision messages for further action.
====> * unsupported_upgrade_check
        Checks environment variables and produces a warning report if the upgrade is unsupported.
====> * check_arm_bootloader
        Install required RPM packages for ARM system upgrades on paths with
====> * check_dnf_pluginpath
        Inhibits the upgrade if a custom DNF plugin path is configured.
====> * check_deprecated_rpm_signature
        Check whether any packages signed by RSA/SHA1 are installed
====> * check_ipa_server
        Check for ipa-server and inhibit upgrade
====> * check_os_release
        Check if the current RHEL minor version is supported. If not, inhibit the upgrade process.
====> * check_system_arch
        Check if system is running at a supported architecture. If no, inhibit the upgrade process.
====> * check_rpm_transaction_events
        Filter RPM transaction events based on installed RPM packages
====> * check_skip_phase
        Skip all the subsequent phases until the report phase.
==> Processing phase `Reports`
====> * verify_check_results
        Check all dialogs and notify that user needs to make some choices.
====> * verify_check_results
        Check all generated results messages and notify user about them.

Debug output written to /var/log/leapp/leapp-preupgrade.log

============================================================
                      REPORT OVERVIEW                       
============================================================

Upgrade has been inhibited due to the following problems:
    1. Use of CIFS detected. Upgrade can't proceed
    2. Use of NFS detected. Upgrade can't proceed

HIGH and MEDIUM severity reports:
    1. Packages available in excluded repositories will not be installed
    2. GRUB2 core will be automatically updated during the upgrade
    3. Remote root logins globally allowed using password
    4. Upgrade is unsupported

Reports summary:
    Errors:                      0
    Inhibitors:                  2
    HIGH severity reports:       4
    MEDIUM severity reports:     0
    LOW severity reports:        1
    INFO severity reports:       3

Before continuing, review the full report below for details about discovered problems and possible remediation instructions:
    A report has been generated at /var/log/leapp/leapp-report.txt
    A report has been generated at /var/log/leapp/leapp-report.json

============================================================
                   END OF REPORT OVERVIEW                   
============================================================

Answerfile has been generated at /var/log/leapp/answerfile
Job ended at 2025-12-17T22:18:37Z
", "encoding": "base64", "source": "/var/log/ripu/ripu.log"} RUNNING HANDLER [infra.leapp.common : Decode ripu.log file] ******************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:26 ok: [managed-node02] => {"ansible_facts": {"ripu_log_file": ["RIPU preupgrade analysis", "Job started at 2025-12-17T22:17:14Z", "", "============================================================", " UNSUPPORTED UPGRADE ", "============================================================", "", "Variable LEAPP_UNSUPPORTED has been detected. Proceeding at your own risk.", "Development variables have been detected:", "- LEAPP_DEVEL_RPMS_ALL_SIGNED=1", "", "============================================================", " UNSUPPORTED UPGRADE ", "============================================================", "", "==> Processing phase `configuration_phase`", "====> * ipu_workflow_config", " IPU workflow config actor", "==> Processing phase `FactsCollection`", "====> * repository_mapping", " Produces message containing repository mapping based on provided file.", "====> * scan_target_os_image", " Scans the provided target OS ISO image to use as a content source for the IPU, if any.", "====> * root_scanner", " Scan the system root directory and produce a message containing", "====> * scanmemory", " Scan Memory of the machine.", "====> * nis_scanner", " Collect information about the NIS packages configuration.", "====> * persistentnetnames", " Get network interface information for physical ethernet interfaces of the original system.", "====> * scan_grub_device_name", " Find the name of the block devices where GRUB is located", "====> * scan_systemd_source", " Provides info about systemd on the source system", "====> * get_enabled_modules", " Provides data about which module streams are enabled on the source system.", "====> * roce_scanner", " Detect active RoCE NICs on IBM Z machines.", "====> * network_manager_connection_scanner", " Scan NetworkManager connection keyfiles", "====> * scanzfcp", " In case of s390x architecture, check whether ZFCP is used.", "====> * storage_scanner", " Provides data about storage settings.", "====> * scanclienablerepo", " Produce CustomTargetRepository based on the LEAPP_ENABLE_REPOS in config.", "====> * firewalld_collect_global_config", " This actor reads firewalld's configuration and produces Model", "====> * open_ssl_config_scanner", " Read an OpenSSL configuration file for further analysis.", "====> * scan_sap_hana", " Gathers information related to SAP HANA instances on the system.", "====> * network_manager_read_config", " Provides data about NetworkManager configuration.", "====> * xorgdrvfacts8to9", " Check the journal logs for deprecated Xorg drivers.", "====> * check_custom_network_scripts", " Check the existence of custom network-scripts and warn user about possible", "====> * scan_files_for_target_userspace", " Scan the source system and identify files that will be copied into the target userspace when it is created.", "====> * scan_kernel_cmdline", " Scan the kernel command line of the booted system.", "====> * udevadm_info", " Produces data exported by the \"udevadm info\" command.", "====> * biosdevname", " Enable biosdevname on the target RHEL system if all interfaces on the source RHEL", "====> * copy_dnf_conf_into_target_userspace", " Copy dnf.conf into target userspace", "====> * rpm_scanner", " Provides data about installed RPM Packages.", "====> * scan_custom_modifications_actor", " Collects information about files in leapp directories that have been modified or newly added.", "====> * sssd_facts_8to9", " Check SSSD configuration for changes in RHEL9 and report them in model.", "====> * read_openssh_config", " Collect information about the OpenSSH configuration.", "====> * firewalld_collect_used_object_names", " This actor reads firewalld's configuration and produces Model", "====> * scan_subscription_manager_info", " Scans the current system for subscription manager information", "====> * scan_grub_config", " Scan grub configuration files for errors.", "====> * scandasd", " In case of s390x architecture, check whether DASD is used.", "====> * distribution_signed_rpm_scanner", " Provide data about distribution signed & third-party RPM packages.", "====> * scan_fips", " Determine whether the source system has FIPS enabled.", "====> * scan_source_files", " Scan files (explicitly specified) of the source system.", "====> * register_ruby_irb_adjustment", " Register a workaround to allow rubygem-irb's directory -> symlink conversion.", "====> * remove_obsolete_gpg_keys", " Remove obsoleted RPM GPG keys.", "====> * rpm_transaction_config_tasks_collector", " Provides additional RPM transaction tasks from /etc/leapp/transaction.", "====> * scan_third_party_target_python_modules", " Detect third-party target Python modules and RPMs on the source system.", "====> * trusted_gpg_keys_scanner", " Scan for trusted GPG keys.", "====> * scan_pkg_manager", " Provides data about package manager (yum/dnf)", "====> * scan_dnf_pluginpath", " Scans DNF configuration for custom pluginpath option.", "====> * persistentnetnamesdisable", " Disable systemd-udevd persistent network naming on machine with single eth0 NIC", "====> * scancryptopolicies", " Scan information about system wide set crypto policies including:", "====> * ifcfg_scanner", " Scan ifcfg files with legacy network configuration", "====> * scan_custom_repofile", " Scan the custom /etc/leapp/files/leapp_upgrade_repositories.repo repo file.", "====> * transaction_workarounds", " Provides additional RPM transaction tasks based on bundled RPM packages.", "====> * luks_scanner", " Provides data about active LUKS devices.", "====> * load_device_driver_deprecation_data", " Loads deprecation data for drivers and devices (PCI & CPU)", "====> * scanblacklistca", " Scan the file system for distrusted CA's in the blacklist directory.", "====> * system_facts", " Provides data about many facts from system.", "====> * pci_devices_scanner", " Provides data about existing PCI Devices.", "====> * scan_source_boot_entry", " Scan the default boot entry of the source system.", "====> * xfs_info_scanner", " This actor scans all mounted mountpoints for XFS information.", "====> * scancpu", " Scan CPUs of the machine.", "====> * used_repository_scanner", " Scan used enabled repositories", "====> * scan_hybrid_image_azure", " Check if the system is using Azure hybrid image.", "====> * get_installed_desktops", " Actor checks if kde or gnome desktop environments", "====> * enable_lvm_autoactivation", " Enable LVM autoactivation in upgrade initramfs.", "====> * scan_source_kernel", " Scan the source system kernel.", "====> * checkrhui", " Check if system is using RHUI infrastructure (on public cloud) and send messages to", "====> * vdo_conversion_scanner", " Provides conversion info about VDO devices.", "====> * multipath_conf_read_8to9", " Read multipath configuration files and extract the necessary information", "====> * satellite_upgrade_facts", " Report which Satellite packages require updates and how to handle PostgreSQL data", "====> * satellite_upgrade_services", " Reconfigure Satellite services", "====> * scan_dynamic_linker_configuration", " Scan the dynamic linker configuration and find modifications.", "====> * ipa_scanner", " Scan system for ipa-client and ipa-server status", "====> * selinuxcontentscanner", " Scan the system for any SELinux customizations", "====> * repositories_blacklist", " Exclude target repositories provided by Red Hat without support.", "====> * detect_kernel_drivers", " Matches all currently loaded kernel drivers against known deprecated and removed drivers.", "====> * scan_default_initramfs", " Scan details of the default boot entry's initramfs image.", "====> * pes_events_scanner", " Provides data about package events from Package Evolution Service.", "====> * setuptargetrepos", " Produces list of repositories that should be available to be used during IPU process.", "==> Processing phase `Checks`", "====> * check_vdo", " Check if VDO devices need to be migrated to lvm management.", "====> * check_bls_grub_onppc64", " Check whether GRUB config is BLS aware on RHEL 8 ppc64le systems", "====> * cephvolumescan", " Retrieves the list of encrypted Ceph OSD", "====> * check_ifcfg", " Ensures that ifcfg files are compatible with NetworkManager", "====> * check_skipped_repositories", " Produces a report if any repositories enabled on the system are going to be skipped.", "====> * nis_check", " Checks if any of NIS components is installed and configured", "====> * xorgdrvcheck8to9", " Warn if Xorg deprecated drivers are in use.", "====> * sssd_check_8to9", " Check SSSD configuration for changes in RHEL9 and report them in model.", "====> * check_cifs", " Check if CIFS filesystem is in use. If yes, inhibit the upgrade process.", "====> * mysql_check", " Actor checking for presence of MySQL installation.", "====> * open_ssl_config_check", " The OpenSSL configuration changed between RHEL8 and RHEL9 significantly with the rebase to", "====> * mariadb_check", " Actor checking for presence of MariaDB installation.", "====> * check_target_iso", " Check that the provided target ISO is a valid ISO image and is located on a persistent partition.", "====> * efi_check_boot", " Adjust EFI boot entry for first reboot", "====> * emit_net_naming_scheme", " Emit necessary modifications of the upgrade environment and target command line to use net.naming-scheme.", "====> * check_third_party_target_python_modules", " Produces a report if any third-party target Python modules are detected on the source system.", "====> * bacula_check", " Actor checking for presence of Bacula installation.", "====> * postgresql_check", " Actor checking for presence of PostgreSQL installation.", "====> * check_systemd_broken_symlinks", " Check whether some systemd symlinks are broken", "====> * check_grubenv_to_file", " Check whether grubenv is a symlink on Azure hybrid images using BIOS.", "====> * network_deprecations", " Ensures that network configuration doesn't rely on unsupported settings", "====> * check_nfs", " Check if NFS filesystem is in use. If yes, inhibit the upgrade process.", "====> * check_persistent_mounts", " Check if mounts required to be persistent are mounted in persistent fashion.", "====> * distribution_signed_rpm_check", " Check if there are any packages that are not signed by distribution GPG keys.", "====> * check_custom_modifications_actor", " Checks CustomModifications messages and produces a report about files in leapp directories that have been", "====> * check_kpatch", " Carry over kpatch-dnf and it's config into the container", "====> * check_root_symlinks", " Check if the symlinks /bin and /lib are relative, not absolute.", "====> * check_openssl_conf", " Check whether the openssl configuration and openssl-IBMCA.", "====> * firewalld_check_service_tftp_client", " This actor will inhibit if firewalld's configuration is using service", "====> * check_luks", " Check if any encrypted partitions are in use and whether they are supported for the upgrade.", "====> * check_nvidia_proprietary_driver", " Check if NVIDIA proprietary driver is in use. If yes, inhibit the upgrade process.", "====> * multipath_conf_check_8to9", " Checks if changes to the multipath configuration files are necessary", "====> * check_consumed_assets", " Check whether Leapp is using correct data assets.", "====> * crypto_policies_check", " This actor consumes previously gathered information about crypto policies on the source", "====> * check_microarchitecture", " Inhibit if RHEL9 microarchitecture requirements are not satisfied", "====> * check_yum_plugins_enabled", " Checks that the required yum plugins are enabled.", "====> * check_installed_kernels", " Inhibit IPU (in-place upgrade) when installed kernels conflict with a safe upgrade.", "====> * open_ssh_drop_in_directory_check", " Trigger a notice that the main sshd_config will be updated to contain", "====> * check_fips", " Inhibit upgrade if FIPS is detected as enabled.", "====> * roce_check", " Check whether RoCE is used on the system and well configured for the upgrade.", "====> * check_sap_hana", " If SAP HANA has been detected, several checks are performed to ensure a successful upgrade.", "====> * firewalld_check_allow_zone_drifting", " This actor will check if AllowZoneDrifting=yes in firewalld.conf. This", "====> * check_target_version", " Check that the target system version is supported by the upgrade process.", "====> * check_insights_auto_register", " Checks if system can be automatically registered into Red Hat Lightspeed", "====> * detect_grub_config_error", " Check grub configuration for various errors.", "====> * check_grub_core", " Check whether we are on legacy (BIOS) system and instruct Leapp to upgrade GRUB core", "====> * check_valid_grubcfg_hybrid", " Check potential for boot failures in Azure Gen1 VMs due to invalid grubcfg", "====> * check_rhsmsku", " Ensure the system is subscribed to the subscription manager", "====> * open_ssh_subsystem_sftp", " The RHEL9 changes the SCP to use SFTP protocol internally. The both RHEL8 and RHEL9", "====> * checkmemory", " The actor check the size of RAM against RHEL8 minimal hardware requirements", "====> * check_etc_releasever", " Check releasever info and provide a guidance based on the facts", "====> * check_fstab_mount_order", " Checks order of entries in /etc/fstab based on their mount point and inhibits upgrade if overshadowing is detected.", "====> * check_dynamic_linker_configuration", " Check for customization of dynamic linker configuration.", "====> * openssh_permit_root_login", " OpenSSH no longer allows root logins with password.", "====> * checktargetrepos", " Check whether target dnf repositories are specified on RHEL.", "====> * check_mount_options", " Check for mount options preventing the upgrade.", "====> * check_boot_avail_space", " Check if at least 100Mib of available space on /boot. If not, inhibit the upgrade process.", "====> * dotnet_unsupported_versions_check", " Check for installed .NET versions that are no longer supported.", "====> * check_detected_devices_and_drivers", " Checks whether or not detected devices and drivers are usable on the target system.", "====> * checkblacklistca", " No documentation has been provided for the checkblacklistca actor.", "====> * check_se_linux", " Check SELinux status and produce decision messages for further action.", "====> * unsupported_upgrade_check", " Checks environment variables and produces a warning report if the upgrade is unsupported.", "====> * check_arm_bootloader", " Install required RPM packages for ARM system upgrades on paths with", "====> * check_dnf_pluginpath", " Inhibits the upgrade if a custom DNF plugin path is configured.", "====> * check_deprecated_rpm_signature", " Check whether any packages signed by RSA/SHA1 are installed", "====> * check_ipa_server", " Check for ipa-server and inhibit upgrade", "====> * check_os_release", " Check if the current RHEL minor version is supported. If not, inhibit the upgrade process.", "====> * check_system_arch", " Check if system is running at a supported architecture. If no, inhibit the upgrade process.", "====> * check_rpm_transaction_events", " Filter RPM transaction events based on installed RPM packages", "====> * check_skip_phase", " Skip all the subsequent phases until the report phase.", "==> Processing phase `Reports`", "====> * verify_check_results", " Check all dialogs and notify that user needs to make some choices.", "====> * verify_check_results", " Check all generated results messages and notify user about them.", "", "Debug output written to /var/log/leapp/leapp-preupgrade.log", "", "============================================================", " REPORT OVERVIEW ", "============================================================", "", "Upgrade has been inhibited due to the following problems:", " 1. Use of CIFS detected. Upgrade can't proceed", " 2. Use of NFS detected. Upgrade can't proceed", "", "HIGH and MEDIUM severity reports:", " 1. Packages available in excluded repositories will not be installed", " 2. GRUB2 core will be automatically updated during the upgrade", " 3. Remote root logins globally allowed using password", " 4. Upgrade is unsupported", "", "Reports summary:", " Errors: 0", " Inhibitors: 2", " HIGH severity reports: 4", " MEDIUM severity reports: 0", " LOW severity reports: 1", " INFO severity reports: 3", "", "Before continuing, review the full report below for details about discovered problems and possible remediation instructions:", " A report has been generated at /var/log/leapp/leapp-report.txt", " A report has been generated at /var/log/leapp/leapp-report.json", "", "============================================================", " END OF REPORT OVERVIEW ", "============================================================", "", "Answerfile has been generated at /var/log/leapp/answerfile", "Job ended at 2025-12-17T22:18:37Z", ""]}, "changed": false} RUNNING HANDLER [infra.leapp.common : Rename log file] ************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:32 changed: [managed-node02] => {"changed": true, "cmd": "export PATH=$PATH\nmv /var/log/ripu/ripu.log /var/log/ripu/ripu.log-20251217T171711\n", "delta": "0:00:00.004820", "end": "2025-12-17 17:18:38.671090", "msg": "", "rc": 0, "start": "2025-12-17 17:18:38.666270", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} RUNNING HANDLER [infra.leapp.analysis : Display inhibitors] ******************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/handlers/main.yml:32 ok: [managed-node02] => { "results_inhibitors.stdout_lines": [ "Risk Factor: high (inhibitor)", "Title: Use of CIFS detected. Upgrade can't proceed", "Summary: CIFS is currently not supported by the inplace upgrade.", "Related links:", " - Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\": https://access.redhat.com/solutions/6964304", "Remediation: [hint] Comment out CIFS entries to proceed with the upgrade.", "Key: d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", "----------------------------------------", "Risk Factor: high (inhibitor)", "Title: Use of NFS detected. Upgrade can't proceed", "Summary: NFS is currently not supported by the inplace upgrade.", "We have found NFS usage at the following locations:", "- NFS shares found in /etc/fstab:", " - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat", " - nest.test.redhat.com:/mnt/qa /mnt/qa", " - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive", " - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist", " - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew", " - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch", "", "Related links:", " - Why does leapp upgrade fail on detecting NFS during upgrade?: https://access.redhat.com/solutions/6964006", "Remediation: [hint] Disable NFS temporarily for the upgrade if possible.", "Key: 9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "----------------------------------------" ] } RUNNING HANDLER [infra.leapp.analysis : Display errors] ************************ task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/handlers/main.yml:40 skipping: [managed-node02] => {} RUNNING HANDLER [infra.leapp.analysis : Preupgrade analysis report is done] **** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/handlers/main.yml:48 ok: [managed-node02] => { "msg": "The preupgrade analysis report generation is now complete. WARNING: Inhibitors found. Review the tasks above or the result file at /var/log/leapp/leapp-report.txt." } TASK [common_upgrade_tasks | Show all inhibitors collected by analysis] ******** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:28 ok: [managed-node02] => { "leapp_inhibitors": [ { "actor": "check_cifs", "audience": "sysadmin", "detail": { "external": [ { "title": "Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\"", "url": "https://access.redhat.com/solutions/6964304" } ], "related_resources": [ { "scheme": "file", "title": "/etc/fstab" } ], "remediations": [ { "context": "Comment out CIFS entries to proceed with the upgrade.", "type": "hint" } ] }, "groups": [ "filesystem", "network", "inhibitor" ], "hostname": "managed-node02", "id": "4d1cb2cd23e364fe30b21a2c96f2bd4a115f09a07739369cb590916e62ae3e63", "key": "d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", "severity": "high", "summary": "CIFS is currently not supported by the inplace upgrade.", "timeStamp": "2025-12-17T22:18:09.837304Z", "title": "Use of CIFS detected. Upgrade can't proceed" }, { "actor": "check_nfs", "audience": "sysadmin", "detail": { "external": [ { "title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006" } ], "related_resources": [ { "scheme": "file", "title": "/etc/fstab" } ], "remediations": [ { "context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint" } ] }, "groups": [ "filesystem", "network", "inhibitor" ], "hostname": "managed-node02", "id": "58677013da2599c83d47da51ef91f3d9470e6762ba1c76a41c7e7cf79895f99f", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch\n", "timeStamp": "2025-12-17T22:18:10.857381Z", "title": "Use of NFS detected. Upgrade can't proceed" } ] } TASK [common_upgrade_tasks | Extract inhibitor titles] ************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:32 ok: [managed-node02] => {"ansible_facts": {"inhibitor_titles": ["Use of CIFS detected. Upgrade can't proceed", "Use of NFS detected. Upgrade can't proceed"]}, "changed": false} TASK [common_upgrade_tasks | Initialize remediation_todo] ********************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:36 ok: [managed-node02] => {"ansible_facts": {"remediation_todo": []}, "changed": false} TASK [common_upgrade_tasks | Map inhibitors to remediation_todo] *************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:40 ok: [managed-node02] => (item=Use of CIFS detected. Upgrade can't proceed) => {"ansible_facts": {"remediation_todo": ["leapp_cifs_detected"]}, "ansible_loop_var": "inhibitor_title", "changed": false, "inhibitor_title": "Use of CIFS detected. Upgrade can't proceed"} ok: [managed-node02] => (item=Use of NFS detected. Upgrade can't proceed) => {"ansible_facts": {"remediation_todo": ["leapp_cifs_detected", "leapp_nfs_detected"]}, "ansible_loop_var": "inhibitor_title", "changed": false, "inhibitor_title": "Use of NFS detected. Upgrade can't proceed"} TASK [common_upgrade_tasks | Debug remediation_todo] *************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:50 ok: [managed-node02] => { "remediation_todo": [ "leapp_cifs_detected", "leapp_nfs_detected" ] } TASK [common_upgrade_tasks | Run remediation] ********************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:54 TASK [infra.leapp.remediate : Check that the leapp-report.json exists] ********* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/main.yml:7 ok: [managed-node02] => {"changed": false, "stat": {"atime": 1766009916.1839302, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 24, "charset": "us-ascii", "checksum": "ede7135df772a99690aec76680bcadab6ef45ca3", "ctime": 1766009894.6879172, "dev": 51715, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 662700209, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1766009894.6879172, "nlink": 1, "path": "/var/log/leapp/leapp-report.json", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 11032, "uid": 0, "version": "3951858320", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} TASK [infra.leapp.remediate : Set leapp_report_missing to true if the leapp-report.json does not exist] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/main.yml:12 skipping: [managed-node02] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.remediate : Read leapp report] ******************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/main.yml:17 ok: [managed-node02] => {"changed": false, "content": "{
  "entries": [
    {
      "audience": "sysadmin",
      "detail": {
        "remediations": [
          {
            "context": "If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).",
            "type": "hint"
          }
        ]
      },
      "groups": [
        "repository",
        "failure"
      ],
      "key": "1b9132cb2362ae7830e48eee7811be9527747de8",
      "severity": "info",
      "summary": "The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-for-rhel-9-x86_64-rhui-rpms\n- codeready-builder-for-rhel-9-s390x-rpms\n- codeready-builder-beta-for-rhel-9-aarch64-rpms\n- crb\n- rhui-codeready-builder-for-rhel-9-aarch64-rhui-rpms\n- rhui-codeready-builder-for-rhel-9-x86_64-rhui-rpms\n- codeready-builder-for-rhel-9-ppc64le-eus-rpms\n- codeready-builder-for-rhel-9-aarch64-rpms\n- codeready-builder-beta-for-rhel-9-ppc64le-rpms\n- codeready-builder-beta-for-rhel-9-s390x-rpms\n- codeready-builder-for-rhel-9-x86_64-eus-rpms\n- codeready-builder-for-rhel-9-s390x-eus-rpms\n- codeready-builder-for-rhel-9-x86_64-rpms\n- codeready-builder-beta-for-rhel-9-x86_64-rpms\n- codeready-builder-for-rhel-9-rhui-rpms\n- codeready-builder-for-rhel-9-ppc64le-rpms\n- codeready-builder-for-rhel-9-aarch64-eus-rpms",
      "title": "Excluded target system repositories",
      "timeStamp": "2025-12-17T22:18:06.628803Z",
      "hostname": "managed-node02",
      "actor": "repositories_blacklist",
      "id": "8ddd72e3f9bc2fc2ef99e58d41e980fc8be6df6b6a0a9d308b27f6857e288314"
    },
    {
      "audience": "sysadmin",
      "detail": {
        "related_resources": [
          {
            "scheme": "package",
            "title": "jitterentropy-devel"
          }
        ]
      },
      "groups": [
        "repository"
      ],
      "key": "2437e204808f987477c0e9be8e4c95b3a87a9f3e",
      "severity": "high",
      "summary": "1 packages will be skipped because they are available only in target system repositories that are intentionally excluded from the list of repositories used during the upgrade. See the report message titled \"Excluded target system repositories\" for details.\nThe list of these packages:\n- jitterentropy-devel (repoid: codeready-builder-for-rhel-9-x86_64-rpms)",
      "title": "Packages available in excluded repositories will not be installed",
      "timeStamp": "2025-12-17T22:18:09.115818Z",
      "hostname": "managed-node02",
      "actor": "pes_events_scanner",
      "id": "dbd54b05971c9bb1433330f3aea4c5ad7dae1a39a61758cc2f70a676c344661a"
    },
    {
      "audience": "sysadmin",
      "detail": {
        "external": [
          {
            "title": "Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\"",
            "url": "https://access.redhat.com/solutions/6964304"
          }
        ],
        "related_resources": [
          {
            "scheme": "file",
            "title": "/etc/fstab"
          }
        ],
        "remediations": [
          {
            "context": "Comment out CIFS entries to proceed with the upgrade.",
            "type": "hint"
          }
        ]
      },
      "groups": [
        "filesystem",
        "network",
        "inhibitor"
      ],
      "key": "d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a",
      "severity": "high",
      "summary": "CIFS is currently not supported by the inplace upgrade.",
      "title": "Use of CIFS detected. Upgrade can't proceed",
      "timeStamp": "2025-12-17T22:18:09.837304Z",
      "hostname": "managed-node02",
      "actor": "check_cifs",
      "id": "4d1cb2cd23e364fe30b21a2c96f2bd4a115f09a07739369cb590916e62ae3e63"
    },
    {
      "audience": "sysadmin",
      "detail": {
        "external": [
          {
            "title": "Why does leapp upgrade fail on detecting NFS during upgrade?",
            "url": "https://access.redhat.com/solutions/6964006"
          }
        ],
        "related_resources": [
          {
            "scheme": "file",
            "title": "/etc/fstab"
          }
        ],
        "remediations": [
          {
            "context": "Disable NFS temporarily for the upgrade if possible.",
            "type": "hint"
          }
        ]
      },
      "groups": [
        "filesystem",
        "network",
        "inhibitor"
      ],
      "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed",
      "severity": "high",
      "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch\n",
      "title": "Use of NFS detected. Upgrade can't proceed",
      "timeStamp": "2025-12-17T22:18:10.857381Z",
      "hostname": "managed-node02",
      "actor": "check_nfs",
      "id": "58677013da2599c83d47da51ef91f3d9470e6762ba1c76a41c7e7cf79895f99f"
    },
    {
      "audience": "sysadmin",
      "detail": {
        "related_resources": [
          {
            "scheme": "package",
            "title": "openssh-server"
          },
          {
            "scheme": "file",
            "title": "/etc/ssh/sshd_config"
          }
        ]
      },
      "groups": [
        "authentication",
        "security",
        "network",
        "services"
      ],
      "key": "96da6937c25c6492e4f1228ee146795989fd3718",
      "severity": "info",
      "summary": "OpenSSH server configuration needs to be modified to contain Include directive for the RHEL9 to work properly and integrate with the other parts of the OS. The following snippet will be added to the /etc/ssh/sshd_config during the ApplicationsPhase: `Include /etc/ssh/sshd_config.d/*.conf`",
      "title": "The upgrade will prepend the Include directive to OpenSSH sshd_config",
      "timeStamp": "2025-12-17T22:18:12.193508Z",
      "hostname": "managed-node02",
      "actor": "open_ssh_drop_in_directory_check",
      "id": "d630cf9049f3978817a2cbb1a8f1338eea6eda21447bdbc19004262dc8ca946b"
    },
    {
      "audience": "sysadmin",
      "groups": [
        "boot"
      ],
      "key": "ac7030e05d2ee248d34f08a9fa040b352bc410a3",
      "severity": "high",
      "summary": "On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running \"grub2-install\" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.",
      "title": "GRUB2 core will be automatically updated during the upgrade",
      "timeStamp": "2025-12-17T22:18:12.654213Z",
      "hostname": "managed-node02",
      "actor": "check_grub_core",
      "id": "d88d472e99da8af25d775f8224fe36da0ec2299bbe12c9584b6505aeb12d6503"
    },
    {
      "audience": "sysadmin",
      "detail": {
        "related_resources": [
          {
            "scheme": "package",
            "title": "openssh-server"
          },
          {
            "scheme": "file",
            "title": "/etc/ssh/sshd_config"
          }
        ],
        "remediations": [
          {
            "context": "If you depend on remote root logins using passwords, consider setting up a different user for remote administration. Otherwise you can ignore this message.",
            "type": "hint"
          }
        ]
      },
      "groups": [
        "authentication",
        "security",
        "network",
        "services"
      ],
      "key": "e738f78bc8f3a84411a4210e3b609057139d1855",
      "severity": "high",
      "summary": "RHEL9 no longer allows remote root logins, but the server configuration explicitly overrides this default. The configuration file will not be updated and root is still going to be allowed to login with password. This is not recommended and considered as a security risk.",
      "title": "Remote root logins globally allowed using password",
      "timeStamp": "2025-12-17T22:18:13.119288Z",
      "hostname": "managed-node02",
      "actor": "openssh_permit_root_login",
      "id": "549e48fd929af00ceece1c84dac3e94a550f8ac0c5ffa4a0a6bec3d1687c5281"
    },
    {
      "audience": "sysadmin",
      "groups": [
        "selinux",
        "security"
      ],
      "key": "8fb81863f8413bd617c2a55b69b8e10ff03d7c72",
      "severity": "info",
      "summary": "SElinux relabeling will be scheduled as the status is permissive/enforcing.",
      "title": "SElinux relabeling will be scheduled",
      "timeStamp": "2025-12-17T22:18:13.834740Z",
      "hostname": "managed-node02",
      "actor": "check_se_linux",
      "id": "01acb3b192ad409fc24748b3f88be229d6d730b7e6d383fd465aad2637c87cd3"
    },
    {
      "audience": "sysadmin",
      "detail": {
        "remediations": [
          {
            "context": "Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the \"/root/tmp_leapp_py3\" SElinux warnings.",
            "type": "hint"
          }
        ]
      },
      "groups": [
        "selinux",
        "security"
      ],
      "key": "39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f",
      "severity": "low",
      "summary": "SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.",
      "title": "SElinux will be set to permissive mode",
      "timeStamp": "2025-12-17T22:18:13.837276Z",
      "hostname": "managed-node02",
      "actor": "check_se_linux",
      "id": "f97159902ac589f4c965bb60681167101aa8bb06be5a6e78d59a152051405daa"
    },
    {
      "audience": "sysadmin",
      "groups": [
        "upgrade process",
        "sanity"
      ],
      "key": "9e5088e3c1f371e020ec777c3d86578f4be143cf",
      "severity": "high",
      "summary": "Environment variable LEAPP_UNSUPPORTED has been detected. A successful and safe upgrade process cannot be guaranteed. From now on you are continuing at your own risk.\n",
      "title": "Upgrade is unsupported",
      "timeStamp": "2025-12-17T22:18:13.894600Z",
      "hostname": "managed-node02",
      "actor": "unsupported_upgrade_check",
      "id": "2e10e8102cdda775078120e008f446774c917b964e26d218897f658326436caf"
    }
  ],
  "leapp_run_id": "8528580f-0ad8-4f37-91af-9c7071a155b6"
}
", "encoding": "base64", "source": "/var/log/leapp/leapp-report.json"} TASK [infra.leapp.remediate : Parse leapp report] ****************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/main.yml:23 ok: [managed-node02] => {"ansible_facts": {"leapp_report_data": {"entries": [{"actor": "repositories_blacklist", "audience": "sysadmin", "detail": {"remediations": [{"context": "If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).", "type": "hint"}]}, "groups": ["repository", "failure"], "hostname": "managed-node02", "id": "8ddd72e3f9bc2fc2ef99e58d41e980fc8be6df6b6a0a9d308b27f6857e288314", "key": "1b9132cb2362ae7830e48eee7811be9527747de8", "severity": "info", "summary": "The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-for-rhel-9-x86_64-rhui-rpms\n- codeready-builder-for-rhel-9-s390x-rpms\n- codeready-builder-beta-for-rhel-9-aarch64-rpms\n- crb\n- rhui-codeready-builder-for-rhel-9-aarch64-rhui-rpms\n- rhui-codeready-builder-for-rhel-9-x86_64-rhui-rpms\n- codeready-builder-for-rhel-9-ppc64le-eus-rpms\n- codeready-builder-for-rhel-9-aarch64-rpms\n- codeready-builder-beta-for-rhel-9-ppc64le-rpms\n- codeready-builder-beta-for-rhel-9-s390x-rpms\n- codeready-builder-for-rhel-9-x86_64-eus-rpms\n- codeready-builder-for-rhel-9-s390x-eus-rpms\n- codeready-builder-for-rhel-9-x86_64-rpms\n- codeready-builder-beta-for-rhel-9-x86_64-rpms\n- codeready-builder-for-rhel-9-rhui-rpms\n- codeready-builder-for-rhel-9-ppc64le-rpms\n- codeready-builder-for-rhel-9-aarch64-eus-rpms", "timeStamp": "2025-12-17T22:18:06.628803Z", "title": "Excluded target system repositories"}, {"actor": "pes_events_scanner", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "jitterentropy-devel"}]}, "groups": ["repository"], "hostname": "managed-node02", "id": "dbd54b05971c9bb1433330f3aea4c5ad7dae1a39a61758cc2f70a676c344661a", "key": "2437e204808f987477c0e9be8e4c95b3a87a9f3e", "severity": "high", "summary": "1 packages will be skipped because they are available only in target system repositories that are intentionally excluded from the list of repositories used during the upgrade. See the report message titled \"Excluded target system repositories\" for details.\nThe list of these packages:\n- jitterentropy-devel (repoid: codeready-builder-for-rhel-9-x86_64-rpms)", "timeStamp": "2025-12-17T22:18:09.115818Z", "title": "Packages available in excluded repositories will not be installed"}, {"actor": "check_cifs", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp upgrade failed with error \"Inhibitor: Use of CIFS detected. Upgrade cannot proceed\"", "url": "https://access.redhat.com/solutions/6964304"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Comment out CIFS entries to proceed with the upgrade.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node02", "id": "4d1cb2cd23e364fe30b21a2c96f2bd4a115f09a07739369cb590916e62ae3e63", "key": "d0e1aa3f7c4fc4450bdcb9a27f47ff464d6af24a", "severity": "high", "summary": "CIFS is currently not supported by the inplace upgrade.", "timeStamp": "2025-12-17T22:18:09.837304Z", "title": "Use of CIFS detected. Upgrade can't proceed"}, {"actor": "check_nfs", "audience": "sysadmin", "detail": {"external": [{"title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node02", "id": "58677013da2599c83d47da51ef91f3d9470e6762ba1c76a41c7e7cf79895f99f", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch\n", "timeStamp": "2025-12-17T22:18:10.857381Z", "title": "Use of NFS detected. Upgrade can't proceed"}, {"actor": "open_ssh_drop_in_directory_check", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "openssh-server"}, {"scheme": "file", "title": "/etc/ssh/sshd_config"}]}, "groups": ["authentication", "security", "network", "services"], "hostname": "managed-node02", "id": "d630cf9049f3978817a2cbb1a8f1338eea6eda21447bdbc19004262dc8ca946b", "key": "96da6937c25c6492e4f1228ee146795989fd3718", "severity": "info", "summary": "OpenSSH server configuration needs to be modified to contain Include directive for the RHEL9 to work properly and integrate with the other parts of the OS. The following snippet will be added to the /etc/ssh/sshd_config during the ApplicationsPhase: `Include /etc/ssh/sshd_config.d/*.conf`", "timeStamp": "2025-12-17T22:18:12.193508Z", "title": "The upgrade will prepend the Include directive to OpenSSH sshd_config"}, {"actor": "check_grub_core", "audience": "sysadmin", "groups": ["boot"], "hostname": "managed-node02", "id": "d88d472e99da8af25d775f8224fe36da0ec2299bbe12c9584b6505aeb12d6503", "key": "ac7030e05d2ee248d34f08a9fa040b352bc410a3", "severity": "high", "summary": "On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running \"grub2-install\" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.", "timeStamp": "2025-12-17T22:18:12.654213Z", "title": "GRUB2 core will be automatically updated during the upgrade"}, {"actor": "openssh_permit_root_login", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "openssh-server"}, {"scheme": "file", "title": "/etc/ssh/sshd_config"}], "remediations": [{"context": "If you depend on remote root logins using passwords, consider setting up a different user for remote administration. Otherwise you can ignore this message.", "type": "hint"}]}, "groups": ["authentication", "security", "network", "services"], "hostname": "managed-node02", "id": "549e48fd929af00ceece1c84dac3e94a550f8ac0c5ffa4a0a6bec3d1687c5281", "key": "e738f78bc8f3a84411a4210e3b609057139d1855", "severity": "high", "summary": "RHEL9 no longer allows remote root logins, but the server configuration explicitly overrides this default. The configuration file will not be updated and root is still going to be allowed to login with password. This is not recommended and considered as a security risk.", "timeStamp": "2025-12-17T22:18:13.119288Z", "title": "Remote root logins globally allowed using password"}, {"actor": "check_se_linux", "audience": "sysadmin", "groups": ["selinux", "security"], "hostname": "managed-node02", "id": "01acb3b192ad409fc24748b3f88be229d6d730b7e6d383fd465aad2637c87cd3", "key": "8fb81863f8413bd617c2a55b69b8e10ff03d7c72", "severity": "info", "summary": "SElinux relabeling will be scheduled as the status is permissive/enforcing.", "timeStamp": "2025-12-17T22:18:13.834740Z", "title": "SElinux relabeling will be scheduled"}, {"actor": "check_se_linux", "audience": "sysadmin", "detail": {"remediations": [{"context": "Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the \"/root/tmp_leapp_py3\" SElinux warnings.", "type": "hint"}]}, "groups": ["selinux", "security"], "hostname": "managed-node02", "id": "f97159902ac589f4c965bb60681167101aa8bb06be5a6e78d59a152051405daa", "key": "39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f", "severity": "low", "summary": "SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.", "timeStamp": "2025-12-17T22:18:13.837276Z", "title": "SElinux will be set to permissive mode"}, {"actor": "unsupported_upgrade_check", "audience": "sysadmin", "groups": ["upgrade process", "sanity"], "hostname": "managed-node02", "id": "2e10e8102cdda775078120e008f446774c917b964e26d218897f658326436caf", "key": "9e5088e3c1f371e020ec777c3d86578f4be143cf", "severity": "high", "summary": "Environment variable LEAPP_UNSUPPORTED has been detected. A successful and safe upgrade process cannot be guaranteed. From now on you are continuing at your own risk.\n", "timeStamp": "2025-12-17T22:18:13.894600Z", "title": "Upgrade is unsupported"}], "leapp_run_id": "8528580f-0ad8-4f37-91af-9c7071a155b6"}}, "changed": false} TASK [infra.leapp.remediate : Check that the 6to7 preupgrade report exists] **** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/main.yml:28 ok: [managed-node02] => {"changed": false, "stat": {"exists": false}} TASK [infra.leapp.remediate : Set leapp_report_missing_6to7 to true if the 6to7 preupgrade report does not exist] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/main.yml:33 ok: [managed-node02] => {"ansible_facts": {"leapp_report_missing_6to7": true}, "changed": false} TASK [infra.leapp.remediate : Read 6to7 preupgrade report] ********************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/main.yml:38 skipping: [managed-node02] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.remediate : Remediate the system] **************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/main.yml:44 included: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_cifs_detected.yml for managed-node02 => (item=leapp_cifs_detected) included: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_nfs_detected.yml for managed-node02 => (item=leapp_nfs_detected) TASK [infra.leapp.remediate : leapp_cifs_detected | Comment CIFS shares in /etc/fstab] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_cifs_detected.yml:4 changed: [managed-node02] => {"changed": true, "msg": "1 replacements made", "rc": 0} TASK [infra.leapp.remediate : leapp_nfs_detected | Continue when leapp report is missing] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_nfs_detected.yml:2 skipping: [managed-node02] => {} TASK [infra.leapp.remediate : leapp_nfs_detected | End execution of playbook if no entry found in leapp report] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_nfs_detected.yml:15 skipping: [managed-node02] => {} TASK [infra.leapp.remediate : leapp_nfs_detected | Get fstab_entries] ********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_nfs_detected.yml:25 ok: [managed-node02] => (item=- NFS shares found in /etc/fstab: - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat - nest.test.redhat.com:/mnt/qa /mnt/qa - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch ) => {"ansible_facts": {"fstab_entries": ["ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat", "nest.test.redhat.com:/mnt/qa", "vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive", "nest.test.redhat.com:/mnt/tpsdist", "ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot", "ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch"]}, "ansible_loop_var": "item", "changed": false, "item": "- NFS shares found in /etc/fstab:\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch\n"} TASK [infra.leapp.remediate : leapp_nfs_detected | Get nfs_mounts] ************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_nfs_detected.yml:31 skipping: [managed-node02] => (item=- NFS shares found in /etc/fstab: - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat - nest.test.redhat.com:/mnt/qa /mnt/qa - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch ) => {"ansible_loop_var": "item", "changed": false, "item": "- NFS shares found in /etc/fstab:\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew\n - ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch\n", "skip_reason": "Conditional result was False"} skipping: [managed-node02] => {"changed": false, "msg": "All items skipped"} TASK [infra.leapp.remediate : leapp_nfs_detected | Comment NFS shares in /etc/fstab] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_nfs_detected.yml:37 changed: [managed-node02] => (item=ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat) => {"ansible_loop_var": "item", "changed": true, "cmd": "set -o pipefail\nentry=\"ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat\"\ngrep -qF \"$entry\" /etc/fstab && sed -i \"s|^$entry|# $entry|\" /etc/fstab\n", "delta": "0:00:00.006431", "end": "2025-12-17 17:18:41.403725", "item": "ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat", "msg": "", "rc": 0, "start": "2025-12-17 17:18:41.397294", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} changed: [managed-node02] => (item=nest.test.redhat.com:/mnt/qa) => {"ansible_loop_var": "item", "changed": true, "cmd": "set -o pipefail\nentry=\"nest.test.redhat.com:/mnt/qa\"\ngrep -qF \"$entry\" /etc/fstab && sed -i \"s|^$entry|# $entry|\" /etc/fstab\n", "delta": "0:00:00.005156", "end": "2025-12-17 17:18:41.746929", "item": "nest.test.redhat.com:/mnt/qa", "msg": "", "rc": 0, "start": "2025-12-17 17:18:41.741773", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} changed: [managed-node02] => (item=vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive) => {"ansible_loop_var": "item", "changed": true, "cmd": "set -o pipefail\nentry=\"vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive\"\ngrep -qF \"$entry\" /etc/fstab && sed -i \"s|^$entry|# $entry|\" /etc/fstab\n", "delta": "0:00:00.005311", "end": "2025-12-17 17:18:42.090730", "item": "vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive", "msg": "", "rc": 0, "start": "2025-12-17 17:18:42.085419", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} changed: [managed-node02] => (item=nest.test.redhat.com:/mnt/tpsdist) => {"ansible_loop_var": "item", "changed": true, "cmd": "set -o pipefail\nentry=\"nest.test.redhat.com:/mnt/tpsdist\"\ngrep -qF \"$entry\" /etc/fstab && sed -i \"s|^$entry|# $entry|\" /etc/fstab\n", "delta": "0:00:00.005677", "end": "2025-12-17 17:18:42.431928", "item": "nest.test.redhat.com:/mnt/tpsdist", "msg": "", "rc": 0, "start": "2025-12-17 17:18:42.426251", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} changed: [managed-node02] => (item=ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot) => {"ansible_loop_var": "item", "changed": true, "cmd": "set -o pipefail\nentry=\"ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot\"\ngrep -qF \"$entry\" /etc/fstab && sed -i \"s|^$entry|# $entry|\" /etc/fstab\n", "delta": "0:00:00.005320", "end": "2025-12-17 17:18:42.787667", "item": "ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot", "msg": "", "rc": 0, "start": "2025-12-17 17:18:42.782347", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} changed: [managed-node02] => (item=ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch) => {"ansible_loop_var": "item", "changed": true, "cmd": "set -o pipefail\nentry=\"ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch\"\ngrep -qF \"$entry\" /etc/fstab && sed -i \"s|^$entry|# $entry|\" /etc/fstab\n", "delta": "0:00:00.005344", "end": "2025-12-17 17:18:43.139966", "item": "ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch", "msg": "", "rc": 0, "start": "2025-12-17 17:18:43.134622", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} TASK [infra.leapp.remediate : leapp_nfs_detected | Unmount NFS Mounts] ********* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_nfs_detected.yml:46 skipping: [managed-node02] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [common_upgrade_tasks | Gather verify remediation tasks] ****************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:58 ok: [managed-node02 -> localhost] => {"changed": false, "examined": 2, "files": [{"atime": 1766009443.9910507, "ctime": 1766009443.8420503, "dev": 51716, "gid": 0, "gr_name": "root", "inode": 83886269, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1766009443.8420503, "nlink": 1, "path": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/verify/remediate_cifs.yml", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 495, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}, {"atime": 1766009443.992051, "ctime": 1766009443.992051, "dev": 51716, "gid": 0, "gr_name": "root", "inode": 83886270, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1766009443.992051, "nlink": 1, "path": "/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/verify/remediate_removed_kernel_drivers.yml", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 453, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}], "matched": 2, "msg": "All paths examined", "skipped_paths": {}} TASK [common_upgrade_tasks | Verify remediations] ****************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:66 included: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/verify/remediate_cifs.yml for managed-node02 => (item=/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/verify/remediate_cifs.yml) included: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/verify/remediate_removed_kernel_drivers.yml for managed-node02 => (item=/root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/verify/remediate_removed_kernel_drivers.yml) TASK [verify | remediate_cifs | Verify the cifs shares remediation] ************ task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/verify/remediate_cifs.yml:5 ok: [managed-node02] => {"changed": false, "cmd": ["cat", "/etc/fstab"], "delta": "0:00:00.002587", "end": "2025-12-17 17:18:43.851713", "failed_when_result": false, "msg": "", "rc": 0, "start": "2025-12-17 17:18:43.849126", "stderr": "", "stderr_lines": [], "stdout": "UUID=81ab810a-9976-472d-a7ab-c66ea0345f41\t/\txfs\tdefaults\t0\t0\nUUID=2610-8C11\t/boot/efi\tvfat\tdefaults,uid=0,gid=0,umask=077,shortname=winnt\t0\t2\n# ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat nfs ro,rsize=32768,wsize=8192,bg,noauto,noatime,nosuid,nodev,intr,noauto 0 0\n# nest.test.redhat.com:/mnt/qa /mnt/qa nfs defaults,rsize=8192,wsize=8192,bg,noauto,noatime,nosuid,nodev,intr,noauto 0 0\n# vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive nfs ro,rsize=32768,wsize=8192,bg,noauto,noatime,nosuid,nodev,intr,noauto 0 0\n# nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist nfs defaults,rsize=8192,wsize=8192,bg,noauto,noatime,nosuid,nodev,intr,noauto 0 0\n# ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew nfs ro,rsize=32768,wsize=8192,bg,noauto,noatime,nosuid,nodev,intr,noauto 0 0\n# ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch nfs ro,rsize=32768,wsize=8192,bg,noauto,noatime,nosuid,nodev,intr,noauto 0 0\n# //127.0.0.1/test_remediate_cifs /mnt/cifs cifs username=test,password=test 0 0", "stdout_lines": ["UUID=81ab810a-9976-472d-a7ab-c66ea0345f41\t/\txfs\tdefaults\t0\t0", "UUID=2610-8C11\t/boot/efi\tvfat\tdefaults,uid=0,gid=0,umask=077,shortname=winnt\t0\t2", "# ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat /mnt/redhat nfs ro,rsize=32768,wsize=8192,bg,noauto,noatime,nosuid,nodev,intr,noauto 0 0", "# nest.test.redhat.com:/mnt/qa /mnt/qa nfs defaults,rsize=8192,wsize=8192,bg,noauto,noatime,nosuid,nodev,intr,noauto 0 0", "# vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive nfs ro,rsize=32768,wsize=8192,bg,noauto,noatime,nosuid,nodev,intr,noauto 0 0", "# nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist nfs defaults,rsize=8192,wsize=8192,bg,noauto,noatime,nosuid,nodev,intr,noauto 0 0", "# ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot /mnt/brew nfs ro,rsize=32768,wsize=8192,bg,noauto,noatime,nosuid,nodev,intr,noauto 0 0", "# ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch /mnt/brew_scratch nfs ro,rsize=32768,wsize=8192,bg,noauto,noatime,nosuid,nodev,intr,noauto 0 0", "# //127.0.0.1/test_remediate_cifs /mnt/cifs cifs username=test,password=test 0 0"]} TASK [verify | remediate_removed_kernel_drivers | Verify the removed kernel drivers remediation] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/verify/remediate_removed_kernel_drivers.yml:3 fatal: [managed-node02]: FAILED! => {"changed": false, "cmd": "set -o pipefail; lsmod | awk '{print $1}'", "delta": "0:00:00.005436", "end": "2025-12-17 17:18:44.204269", "failed_when_result": "The conditional check 'diff | length > 0' failed. The error was: error while evaluating conditional (diff | length > 0): {{ modlist | intersect(__leapp_debug_unsupported_modules) | list }}: '__leapp_debug_unsupported_modules' is undefined. '__leapp_debug_unsupported_modules' is undefined. {{ modlist | intersect(__leapp_debug_unsupported_modules) | list }}: '__leapp_debug_unsupported_modules' is undefined. '__leapp_debug_unsupported_modules' is undefined", "msg": "", "rc": 0, "start": "2025-12-17 17:18:44.198833", "stderr": "", "stderr_lines": [], "stdout": "Module\nbinfmt_misc\ncirrus\ndrm_shmem_helper\ndrm_kms_helper\nsyscopyarea\nintel_rapl_msr\nsysfillrect\nsysimgblt\nintel_rapl_common\nsb_edac\ncrc32_pclmul\ndrm\nrapl\ni2c_piix4\nata_generic\npcspkr\nsunrpc\nvfat\nfat\nxfs\nlibcrc32c\ncrct10dif_pclmul\ncrc32c_intel\nxen_blkfront\nxen_netfront\nghash_clmulni_intel\nserio_raw\nata_piix\nlibata", "stdout_lines": ["Module", "binfmt_misc", "cirrus", "drm_shmem_helper", "drm_kms_helper", "syscopyarea", "intel_rapl_msr", "sysfillrect", "sysimgblt", "intel_rapl_common", "sb_edac", "crc32_pclmul", "drm", "rapl", "i2c_piix4", "ata_generic", "pcspkr", "sunrpc", "vfat", "fat", "xfs", "libcrc32c", "crct10dif_pclmul", "crc32c_intel", "xen_blkfront", "xen_netfront", "ghash_clmulni_intel", "serio_raw", "ata_piix", "libata"]} TASK [tests_upgrade_custom | Cleanup | Remove log files] *********************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/tests_upgrade_custom.yml:49 changed: [managed-node02] => {"changed": true, "cmd": "set -euxo pipefail\nrm -f /var/log/leapp/leapp-upgrade.log\nrm -f /var/log/ripu/ripu.log*\n", "delta": "0:00:00.004374", "end": "2025-12-17 17:18:44.549390", "msg": "", "rc": 0, "start": "2025-12-17 17:18:44.545016", "stderr": "+ rm -f /var/log/leapp/leapp-upgrade.log\n+ rm -f /var/log/ripu/ripu.log-20251217T171711", "stderr_lines": ["+ rm -f /var/log/leapp/leapp-upgrade.log", "+ rm -f /var/log/ripu/ripu.log-20251217T171711"], "stdout": "", "stdout_lines": []} PLAY RECAP ********************************************************************* managed-node02 : ok=61 changed=16 unreachable=0 failed=1 skipped=16 rescued=0 ignored=0 -- Logs begin at Wed 2025-12-17 17:07:26 EST, end at Wed 2025-12-17 17:18:44 EST. -- Dec 17 17:17:09 managed-node02 sshd[4493]: Accepted publickey for root from 10.31.42.157 port 48316 ssh2: ECDSA SHA256:QaT17p0U8tR+/tvjIQ/qroY5V7rGCr589iUR3q46Ews Dec 17 17:17:09 managed-node02 systemd[1]: Started Session 7 of user root. -- Subject: Unit session-7.scope has finished start-up -- Defined-By: systemd -- Support: https://access.redhat.com/support -- -- Unit session-7.scope has finished starting up. -- -- The start-up result is done. Dec 17 17:17:09 managed-node02 systemd-logind[605]: New session 7 of user root. -- Subject: A new session 7 has been created for user root -- Defined-By: systemd -- Support: https://access.redhat.com/support -- Documentation: https://www.freedesktop.org/wiki/Software/systemd/multiseat -- -- A new session with the ID 7 has been created for the user root. -- -- The leading process of the session is 4493. Dec 17 17:17:09 managed-node02 sshd[4493]: pam_unix(sshd:session): session opened for user root by (uid=0) Dec 17 17:17:10 managed-node02 platform-python[4617]: ansible-ansible.legacy.setup Invoked with gather_subset=['all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Dec 17 17:17:11 managed-node02 platform-python[4751]: ansible-ansible.builtin.stat Invoked with path=/var/log/leapp/leapp-upgrade.log follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 17 17:17:13 managed-node02 platform-python[4856]: ansible-ansible.builtin.lineinfile Invoked with path=/etc/fstab line=//127.0.0.1/test_remediate_cifs /mnt/cifs cifs username=test,password=test 0 0 state=present backrefs=False create=False backup=False firstmatch=False unsafe_writes=False regexp=None search_string=None insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 17 17:17:13 managed-node02 platform-python[4961]: ansible-ansible.builtin.file Invoked with path=/var/log/ripu state=directory owner=root group=root mode=0755 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 17 17:17:14 managed-node02 platform-python[5066]: ansible-ansible.builtin.stat Invoked with path=/var/log/ripu/ripu.log follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 17 17:17:14 managed-node02 platform-python[5171]: ansible-ansible.legacy.stat Invoked with path=/var/log/ripu/ripu.log follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 17 17:17:15 managed-node02 platform-python[5255]: ansible-ansible.legacy.copy Invoked with dest=/var/log/ripu/ripu.log owner=root group=root mode=0644 src=/root/.ansible/tmp/ansible-tmp-1766009834.4027035-8005-145707831020242/source _original_basename=tmpqyi09v3o follow=False checksum=7f3fcfecd3a94a277e887360ac36c1ee93514082 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Dec 17 17:17:15 managed-node02 platform-python[5362]: ansible-ansible.builtin.file Invoked with path=/etc/ansible/facts.d state=directory mode=0755 owner=root group=root recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 17 17:17:15 managed-node02 platform-python[5467]: ansible-ansible.legacy.stat Invoked with path=/etc/ansible/facts.d/pre_ripu.fact follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 17 17:17:16 managed-node02 platform-python[5551]: ansible-ansible.legacy.copy Invoked with dest=/etc/ansible/facts.d/pre_ripu.fact mode=0644 owner=root group=root src=/root/.ansible/tmp/ansible-tmp-1766009835.5954185-8155-73261622141338/source _original_basename=tmp42ys50xg follow=False checksum=0028658329eb6624de0afbedbe436077a544766c backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Dec 17 17:17:16 managed-node02 platform-python[5658]: ansible-ansible.legacy.command Invoked with _raw_params=set -o pipefail; export PATH=$PATH; rpm -qa | grep -ve '[\.|+]el8' | grep -vE '^(gpg-pubkey|libmodulemd|katello-ca-consumer)' | sort _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 17 17:17:18 managed-node02 platform-python[5768]: ansible-ansible.legacy.stat Invoked with path=/etc/ansible/facts.d/non_rhel_packages.fact follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 17 17:17:18 managed-node02 platform-python[5852]: ansible-ansible.legacy.copy Invoked with dest=/etc/ansible/facts.d/non_rhel_packages.fact mode=0644 owner=root group=root src=/root/.ansible/tmp/ansible-tmp-1766009837.8809972-8364-24936593168960/source _original_basename=tmpw_qxtj1l follow=False checksum=97d170e1550eee4afc0af065b78cda302a97674c backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Dec 17 17:17:19 managed-node02 platform-python[5959]: ansible-ansible.legacy.dnf Invoked with name=['leapp-upgrade'] enablerepo=[] state=latest allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 17 17:17:27 managed-node02 dbus-daemon[601]: [system] Reloaded configuration Dec 17 17:17:27 managed-node02 dbus-daemon[601]: [system] Reloaded configuration Dec 17 17:17:27 managed-node02 dbus-daemon[601]: [system] Reloaded configuration Dec 17 17:17:27 managed-node02 dbus-daemon[601]: [system] Reloaded configuration Dec 17 17:17:27 managed-node02 dbus-daemon[601]: [system] Reloaded configuration Dec 17 17:17:27 managed-node02 dbus-daemon[601]: [system] Reloaded configuration Dec 17 17:17:27 managed-node02 dbus-daemon[601]: [system] Reloaded configuration Dec 17 17:17:30 managed-node02 systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. -- Subject: Unit run-r01f34e46abd34dda8f2d39e31e970cae.service has finished start-up -- Defined-By: systemd -- Support: https://access.redhat.com/support -- -- Unit run-r01f34e46abd34dda8f2d39e31e970cae.service has finished starting up. -- -- The start-up result is done. Dec 17 17:17:30 managed-node02 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 17 17:17:30 managed-node02 systemd[1]: Starting man-db-cache-update.service... -- Subject: Unit man-db-cache-update.service has begun start-up -- Defined-By: systemd -- Support: https://access.redhat.com/support -- -- Unit man-db-cache-update.service has begun starting up. Dec 17 17:17:30 managed-node02 systemd[1]: Reloading. Dec 17 17:17:31 managed-node02 platform-python[6109]: ansible-ansible.builtin.file Invoked with path=/var/log/leapp state=directory owner=root group=root mode=0700 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 17 17:17:31 managed-node02 platform-python[6359]: ansible-ansible.legacy.stat Invoked with path=/var/log/leapp/answerfile follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 17 17:17:31 managed-node02 platform-python[6679]: ansible-ansible.legacy.copy Invoked with dest=/var/log/leapp/answerfile owner=root group=root mode=0644 src=/root/.ansible/tmp/ansible-tmp-1766009851.328443-8868-127373187370051/source _original_basename=tmp3mdmdzvg follow=False checksum=3d934ad808576e3a7fb4c14a89645a4ad55ccf53 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Dec 17 17:17:32 managed-node02 platform-python[6825]: ansible-ansible.builtin.file Invoked with path=/etc/leapp/files/leapp_upgrade_repositories.repo state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 17 17:17:32 managed-node02 systemd[1]: man-db-cache-update.service: Succeeded. -- Subject: Unit succeeded -- Defined-By: systemd -- Support: https://access.redhat.com/support -- -- The unit man-db-cache-update.service has successfully entered the 'dead' state. Dec 17 17:17:32 managed-node02 systemd[1]: Started man-db-cache-update.service. -- Subject: Unit man-db-cache-update.service has finished start-up -- Defined-By: systemd -- Support: https://access.redhat.com/support -- -- Unit man-db-cache-update.service has finished starting up. -- -- The start-up result is done. Dec 17 17:17:32 managed-node02 systemd[1]: run-r01f34e46abd34dda8f2d39e31e970cae.service: Succeeded. -- Subject: Unit succeeded -- Defined-By: systemd -- Support: https://access.redhat.com/support -- -- The unit run-r01f34e46abd34dda8f2d39e31e970cae.service has successfully entered the 'dead' state. Dec 17 17:17:33 managed-node02 ansible-async_wrapper.py[7245]: Invoked with j468921254348 7200 /root/.ansible/tmp/ansible-tmp-1766009853.2153091-8917-191196184895924/AnsiballZ_command.py _ Dec 17 17:17:33 managed-node02 ansible-async_wrapper.py[7249]: Starting module and watcher Dec 17 17:17:33 managed-node02 ansible-async_wrapper.py[7249]: Start watching 7250 (7200) Dec 17 17:17:33 managed-node02 ansible-async_wrapper.py[7250]: Start module (7250) Dec 17 17:17:33 managed-node02 ansible-async_wrapper.py[7245]: Return async_wrapper task started. Dec 17 17:17:33 managed-node02 platform-python[7251]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=set -o pipefail; export PATH=$PATH; ulimit -n 16384; leapp preupgrade --report-schema=1.2.0 --no-rhsm 2>&1 | tee -a /var/log/ripu/ripu.log _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Dec 17 17:17:38 managed-node02 ansible-async_wrapper.py[7249]: 7250 still running (7200) Dec 17 17:17:43 managed-node02 ansible-async_wrapper.py[7249]: 7250 still running (7195) Dec 17 17:17:48 managed-node02 ansible-async_wrapper.py[7249]: 7250 still running (7190) Dec 17 17:17:53 managed-node02 ansible-async_wrapper.py[7249]: 7250 still running (7185) Dec 17 17:17:55 managed-node02 systemd[1]: proc-sys-fs-binfmt_misc.automount: Got automount request for /proc/sys/fs/binfmt_misc, triggered by 10332 (sysctl) Dec 17 17:17:55 managed-node02 systemd[1]: Mounting Arbitrary Executable File Formats File System... -- Subject: Unit proc-sys-fs-binfmt_misc.mount has begun start-up -- Defined-By: systemd -- Support: https://access.redhat.com/support -- -- Unit proc-sys-fs-binfmt_misc.mount has begun starting up. Dec 17 17:17:55 managed-node02 systemd[1]: Mounted Arbitrary Executable File Formats File System. -- Subject: Unit proc-sys-fs-binfmt_misc.mount has finished start-up -- Defined-By: systemd -- Support: https://access.redhat.com/support -- -- Unit proc-sys-fs-binfmt_misc.mount has finished starting up. -- -- The start-up result is done. Dec 17 17:17:58 managed-node02 ansible-async_wrapper.py[7249]: 7250 still running (7180) Dec 17 17:18:03 managed-node02 ansible-async_wrapper.py[7249]: 7250 still running (7175) Dec 17 17:18:08 managed-node02 ansible-async_wrapper.py[7249]: 7250 still running (7170) Dec 17 17:18:13 managed-node02 ansible-async_wrapper.py[7249]: 7250 still running (7165) Dec 17 17:18:14 managed-node02 ansible-async_wrapper.py[7250]: Module complete (7250) Dec 17 17:18:18 managed-node02 ansible-async_wrapper.py[7249]: Done in kid B. Dec 17 17:18:32 managed-node02 sshd[4496]: Received disconnect from 10.31.42.157 port 48316:11: disconnected by user Dec 17 17:18:32 managed-node02 sshd[4496]: Disconnected from user root 10.31.42.157 port 48316 Dec 17 17:18:32 managed-node02 sshd[4493]: pam_unix(sshd:session): session closed for user root Dec 17 17:18:32 managed-node02 systemd[1]: session-7.scope: Succeeded. -- Subject: Unit succeeded -- Defined-By: systemd -- Support: https://access.redhat.com/support -- -- The unit session-7.scope has successfully entered the 'dead' state. Dec 17 17:18:32 managed-node02 systemd-logind[605]: Session 7 logged out. Waiting for processes to exit. Dec 17 17:18:32 managed-node02 systemd-logind[605]: Removed session 7. -- Subject: Session 7 has been terminated -- Defined-By: systemd -- Support: https://access.redhat.com/support -- Documentation: https://www.freedesktop.org/wiki/Software/systemd/multiseat -- -- A session with the ID 7 has been terminated. Dec 17 17:18:33 managed-node02 sshd[15123]: Accepted publickey for root from 10.31.42.157 port 55604 ssh2: ECDSA SHA256:QaT17p0U8tR+/tvjIQ/qroY5V7rGCr589iUR3q46Ews Dec 17 17:18:33 managed-node02 systemd[1]: Started Session 8 of user root. -- Subject: Unit session-8.scope has finished start-up -- Defined-By: systemd -- Support: https://access.redhat.com/support -- -- Unit session-8.scope has finished starting up. -- -- The start-up result is done. Dec 17 17:18:33 managed-node02 systemd-logind[605]: New session 8 of user root. -- Subject: A new session 8 has been created for user root -- Defined-By: systemd -- Support: https://access.redhat.com/support -- Documentation: https://www.freedesktop.org/wiki/Software/systemd/multiseat -- -- A new session with the ID 8 has been created for the user root. -- -- The leading process of the session is 15123. Dec 17 17:18:33 managed-node02 sshd[15123]: pam_unix(sshd:session): session opened for user root by (uid=0) Dec 17 17:18:34 managed-node02 platform-python[15229]: ansible-ansible.legacy.async_status Invoked with jid=j468921254348.7245 mode=status _async_dir=/root/.ansible_async Dec 17 17:18:34 managed-node02 platform-python[15297]: ansible-ansible.legacy.async_status Invoked with jid=j468921254348.7245 mode=cleanup _async_dir=/root/.ansible_async Dec 17 17:18:35 managed-node02 platform-python[15402]: ansible-ansible.builtin.stat Invoked with path=/var/log/leapp/leapp-report.txt follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 17 17:18:35 managed-node02 platform-python[15509]: ansible-ansible.builtin.slurp Invoked with src=/var/log/leapp/leapp-report.txt Dec 17 17:18:36 managed-node02 platform-python[15614]: ansible-ansible.builtin.slurp Invoked with src=/var/log/leapp/leapp-report.json Dec 17 17:18:36 managed-node02 platform-python[15719]: ansible-ansible.legacy.command Invoked with _raw_params=awk '/\(inhibitor\)/,/^-------/' /var/log/leapp/leapp-report.txt _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 17 17:18:37 managed-node02 platform-python[15825]: ansible-ansible.legacy.command Invoked with _raw_params=awk '/high \(error\)/,/^-------/' /var/log/leapp/leapp-report.txt _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 17 17:18:37 managed-node02 platform-python[15931]: ansible-ansible.builtin.stat Invoked with path=/var/log/ripu/ripu.log follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 17 17:18:37 managed-node02 platform-python[16038]: ansible-ansible.builtin.lineinfile Invoked with path=/var/log/ripu/ripu.log line=Job ended at 2025-12-17T22:18:37Z owner=root group=root mode=0644 state=present backrefs=False create=False backup=False firstmatch=False unsafe_writes=False regexp=None search_string=None insertafter=None insertbefore=None validate=None seuser=None serole=None selevel=None setype=None attributes=None Dec 17 17:18:38 managed-node02 platform-python[16143]: ansible-ansible.builtin.slurp Invoked with src=/var/log/ripu/ripu.log Dec 17 17:18:38 managed-node02 platform-python[16248]: ansible-ansible.legacy.command Invoked with _raw_params=export PATH=$PATH mv /var/log/ripu/ripu.log /var/log/ripu/ripu.log-20251217T171711 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 17 17:18:39 managed-node02 platform-python[16354]: ansible-ansible.builtin.stat Invoked with path=/var/log/leapp/leapp-report.json follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 17 17:18:39 managed-node02 platform-python[16461]: ansible-ansible.builtin.slurp Invoked with src=/var/log/leapp/leapp-report.json Dec 17 17:18:40 managed-node02 platform-python[16566]: ansible-ansible.builtin.stat Invoked with path=/root/preupgrade/result.txt follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 17 17:18:40 managed-node02 platform-python[16671]: ansible-ansible.builtin.replace Invoked with path=/etc/fstab regexp=(.*)cifs(.*) replace=# \1cifs\2 backup=False encoding=utf-8 unsafe_writes=False after=None before=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 17 17:18:41 managed-node02 platform-python[16776]: ansible-ansible.legacy.command Invoked with _raw_params=set -o pipefail entry="ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat" grep -qF "$entry" /etc/fstab && sed -i "s|^$entry|# $entry|" /etc/fstab _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 17 17:18:41 managed-node02 platform-python[16883]: ansible-ansible.legacy.command Invoked with _raw_params=set -o pipefail entry="nest.test.redhat.com:/mnt/qa" grep -qF "$entry" /etc/fstab && sed -i "s|^$entry|# $entry|" /etc/fstab _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 17 17:18:42 managed-node02 platform-python[16990]: ansible-ansible.legacy.command Invoked with _raw_params=set -o pipefail entry="vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive" grep -qF "$entry" /etc/fstab && sed -i "s|^$entry|# $entry|" /etc/fstab _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 17 17:18:42 managed-node02 platform-python[17097]: ansible-ansible.legacy.command Invoked with _raw_params=set -o pipefail entry="nest.test.redhat.com:/mnt/tpsdist" grep -qF "$entry" /etc/fstab && sed -i "s|^$entry|# $entry|" /etc/fstab _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 17 17:18:42 managed-node02 platform-python[17204]: ansible-ansible.legacy.command Invoked with _raw_params=set -o pipefail entry="ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_engineering_sm/devarchive/redhat/brewroot" grep -qF "$entry" /etc/fstab && sed -i "s|^$entry|# $entry|" /etc/fstab _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 17 17:18:43 managed-node02 platform-python[17311]: ansible-ansible.legacy.command Invoked with _raw_params=set -o pipefail entry="ntap-rdu2-c01-eng01-nfs01b.storage.rdu2.redhat.com:/bos_eng01_devops_brew_scratch_nfs_sm/scratch" grep -qF "$entry" /etc/fstab && sed -i "s|^$entry|# $entry|" /etc/fstab _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 17 17:18:43 managed-node02 platform-python[17418]: ansible-ansible.legacy.command Invoked with _raw_params=cat /etc/fstab _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 17 17:18:44 managed-node02 platform-python[17524]: ansible-ansible.legacy.command Invoked with _raw_params=set -o pipefail; lsmod | awk '{print $1}' _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 17 17:18:44 managed-node02 platform-python[17632]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=set -euxo pipefail rm -f /var/log/leapp/leapp-upgrade.log rm -f /var/log/ripu/ripu.log* _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Dec 17 17:18:44 managed-node02 sshd[17652]: Accepted publickey for root from 10.31.42.157 port 45492 ssh2: RSA SHA256:9j1blwt3wcrRiGYZQ7ZGu9axm3cDklH6/z4c+Ee8CzE Dec 17 17:18:44 managed-node02 systemd[1]: Started Session 9 of user root. -- Subject: Unit session-9.scope has finished start-up -- Defined-By: systemd -- Support: https://access.redhat.com/support -- -- Unit session-9.scope has finished starting up. -- -- The start-up result is done. Dec 17 17:18:44 managed-node02 systemd-logind[605]: New session 9 of user root. -- Subject: A new session 9 has been created for user root -- Defined-By: systemd -- Support: https://access.redhat.com/support -- Documentation: https://www.freedesktop.org/wiki/Software/systemd/multiseat -- -- A new session with the ID 9 has been created for the user root. -- -- The leading process of the session is 17652. Dec 17 17:18:44 managed-node02 sshd[17652]: pam_unix(sshd:session): session opened for user root by (uid=0) Dec 17 17:18:44 managed-node02 sshd[17655]: Received disconnect from 10.31.42.157 port 45492:11: disconnected by user Dec 17 17:18:44 managed-node02 sshd[17655]: Disconnected from user root 10.31.42.157 port 45492 Dec 17 17:18:44 managed-node02 sshd[17652]: pam_unix(sshd:session): session closed for user root Dec 17 17:18:44 managed-node02 systemd[1]: session-9.scope: Succeeded. -- Subject: Unit succeeded -- Defined-By: systemd -- Support: https://access.redhat.com/support -- -- The unit session-9.scope has successfully entered the 'dead' state. Dec 17 17:18:44 managed-node02 systemd-logind[605]: Session 9 logged out. Waiting for processes to exit. Dec 17 17:18:44 managed-node02 systemd-logind[605]: Removed session 9. -- Subject: Session 9 has been terminated -- Defined-By: systemd -- Support: https://access.redhat.com/support -- Documentation: https://www.freedesktop.org/wiki/Software/systemd/multiseat -- -- A session with the ID 9 has been terminated. Dec 17 17:18:44 managed-node02 sshd[17673]: Accepted publickey for root from 10.31.42.157 port 45494 ssh2: RSA SHA256:9j1blwt3wcrRiGYZQ7ZGu9axm3cDklH6/z4c+Ee8CzE Dec 17 17:18:44 managed-node02 systemd[1]: Started Session 10 of user root. -- Subject: Unit session-10.scope has finished start-up -- Defined-By: systemd -- Support: https://access.redhat.com/support -- -- Unit session-10.scope has finished starting up. -- -- The start-up result is done. Dec 17 17:18:44 managed-node02 systemd-logind[605]: New session 10 of user root. -- Subject: A new session 10 has been created for user root -- Defined-By: systemd -- Support: https://access.redhat.com/support -- Documentation: https://www.freedesktop.org/wiki/Software/systemd/multiseat -- -- A new session with the ID 10 has been created for the user root. -- -- The leading process of the session is 17673. Dec 17 17:18:44 managed-node02 sshd[17673]: pam_unix(sshd:session): session opened for user root by (uid=0)